Cloud Security Engineer
Cyber security analyst job in Philadelphia, PA
Our client is one of the largest Hospitals in the US. Based out of Philadelphia, they are looking to hire a Cloud Security Engineer on a Contract basis.
Contract Duration: 6 Month Contract (Potential for extension or conversion)
Required Skills & Experience
At least twelve (12) years industry related experience, including experience in one to two IT disciplines (such as technical architecture, network management, application development, middleware, information analysis, database management or operations) in a multitier environment.
CISSP Certification
At least six (6) years experience with information security, regulatory compliance and risk management concepts.
At least three (3) years experience with Identity and Access Management, user provisioning, Role Based Access Control, or control self-assessment methodologies and security awareness training.
Experience with Cloud and/or Virtualization technologies.
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications,
Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Daily Responsibilities
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
You will receive the following benefits:
Medical Insurance - Four medical plans to choose from for you and your family
Dental & Orthodontia Benefits
Vision Benefits
Health Savings Account (HSA)
Health and Dependent Care Flexible Spending Accounts
Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance
Hospital Indemnity Insurance
401(k) including match with pre and post-tax options
Paid Sick Time Leave
Legal and Identity Protection Plans
Pre-tax Commuter Benefit
529 College Saver Plan
Motion Recruitment Partners (MRP) is an Equal Opportunity Employer. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under MRP's Employment Accommodation policy. Applicants need to make their needs known in advance.
Cloud Security Engineer
Cyber security analyst job in Philadelphia, PA
The Cloud Security Engineer will play a pivotal role in the cloud security service delivery model. The role combines deep technical expertise, collaboration across internal and external teams to design, implement, and optimize cloud security controls and service lines. The candidate will support both project-based and continuous security initiatives, focusing on securing HOSPITAL's cloud migration, supporting cloud security tool optimization, cloud security processes for the Information Security team, cloud/hybrid controls, automation, and risk-driven security outcomes.
Proven experience in securing a multi-cloud environment.
Proven experience with Identity and access management in the cloud
Proven experience with all security service lines in a cloud environment and the supporting security tools and processes to be successful.
Demonstrate collaboration with internal stakeholders, vendors, and supporting teams to design, implement, and maintain security technologies across network, endpoint, identity, and cloud infrastructure.
Drive continuous improvement and coverage of cloud security controls by validating alerts, triaging escalations, and working with the MSP to fine-tune detection and prevention capabilities.
Lead or support the development of incident response plans, engineering runbooks, tabletop exercises, and system hardening guides.
Ensure alignment of security architectures with HOSPITAL's policies, standards, and external frameworks such as NIST SP 800-53, HIPAA, PCI-DSS, CISA ZTMM, CIS Benchmarks, and Microsoft CAF Secure Methodology, AWS CAF, AWS Well Architected framework, Google CAF
Participate in design and governance forums to provide security input into infrastructure, DevSecOps, and cloud-native application strategies.
Assist with audits, compliance assessments, risk remediation plans, and evidence collection with internal compliance and external third-party stakeholders.
Mentor and support junior InfoSec engineers through documentation, training, and peer reviews.
Hands-on experience in security engineering, systems integration, and cloud architecture (Azure preferred).
Proficiency in tools and domains such as: EDR (Microsoft Defender), SIEM (Sentinel or Splunk), CSPM (e.g., Wiz), IAM (Entra ID), VPNs/NGFWs, NAC, and encryption protocols.
Demonstrated understanding of secure configuration management, automation pipelines (e.g., Terraform, PowerShell), and vulnerability management platforms.
What you will do
A Principal Information Security Specialist has similar responsibilities to Information Security Specialist III personnel. However, a Principal Information Security Specialist is deemed to be the subject matter expert and in-house advisor on complex problems and issues. A Principal Information Security Specialist also:
Works independently to initiate assignments and draws upon extensive professional knowledge and experience to make independent judgments regarding analysis, evaluation, development, and implementation of enterprise long-term solutions and operating initiatives to ensure that enterprise architectural objectives are aligned with organizational needs and strategic goals.
Skills: Duties (cont'd):
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of HOSPITAL DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
Skills:
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications, Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store HOSPITAL information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Cyber Security Analyst II- Secret Clearance | Philadelphia, PA
Cyber security analyst job in Philadelphia, PA
Cybersecurity Analyst II- Secret Clearance | Philadelphia, PA Cambridge International Systems, Inc. Join a dynamic global team united by shared values: commitment, integrity, and perseverance. At Cambridge, you'll work alongside top talent worldwide, tackling some of today's most complex and critical challenges in defense and security.
We are currently seeking a Cybersecurity Analyst to support operations in Philadelphia, PA. This is a full-time, CONUS position requiring an active DoD Secret clearance,
What You'll Do
As a Cybersecurity Analyst, you will play a critical role in planning and implementing comprehensive security measures to safeguard computer systems, networks, and sensitive data from unauthorized access, data loss, and service interruptions, that serve U.S. government missions.
You will:
Plans and implements security measures to protect computer systems, networks, and data from loss and service interruptions.
Analyzes and documents security risks, breaches, and other cyber security incidents and the damage they cause.
Develops and implements a network disaster recovery plan and oversees the monitoring of the computer networks for security issues.
Installs and operates security software and measures to protect systems and information infrastructure, including firewalls and data encryption programs.
Collaborate with the security team to perform tests and find network weaknesses.
Assesses data collections/ tools via ACAS
Experience utilizing HBSS, web content filters, SIEM, and firewall systems
Works with management to develop best practices.
Researches and keeps current on the latest IT intelligence technologies, trends, and security standards.
What You'll Bring
Required Qualifications:
Education & Experience:
This position requires a Bachelor's degree in Computer Science, Information Technology or an equivalent Science, Technology, and Engineering & Math (STEM) degree and 3+ years of experience; years of experience may be substituted in lieu of degree.
DoD 8570.1-M Security+ required; CISSP, CASP+ or similar IAT lvl. III highly preferred.
IAM level II required
Assist End Customer in attaining and maintain DOD, DON, and NAVSEA continuous inspection readiness posture
3+ years of performing analysis of logs and events.
3+ years of automating processes through scripting and assessing impacts
3+ years of Windows Administration or Engineering experience.
Experience with the following publications NIST 800-53/A, NIST 800-37, CNSS 1253, NIST 800-60 Rev I&II, ECSM series
Development of SCTMs, POA&M's, Vulnerability Reports and CSSP tool implementation highly preferred.
Categorization experience and familiarity with assisting stakeholders evaluate risk and develop Concept of Operations artifact(s) to develop various ATO packages.
MCP, MCITP, MCSA, MCSA on Windows 2000 or higher strongly preferred.
Some demonstrated experience either operating, administering, or testing Linux preferred.
Experience with EMass & MCCAST (and other software tools) highly preferred.
3+ years of RMF experience.
Experience for implementing and mapping RMF lifecycle to project lifecycles.
Must have a current and active DoD Secret security clearance.
Proficient with modern IT tools and infrastructure technologies
Travel & Passport
Up to 25% travel, both CONUS and OCONUS may be required; some overnight stays possible.
Must have an active passport to support OCONUS travel
Work Environment
Compliance with vaccination and medical requirements for TDY/OCONUS roles as per Vaccine Recommendations by AOR | Health.mil.
Office setting:
Primarily an office-based role in Philadelphia, PA
Standard desk/computer work with flexibility for walking and movement on site
Must be able to work in an office environment, sitting at a desk, looking at a computer for most of the workday.
Work is physically comfortable; the employee has discretion about sitting, walking, standing, etc.
May be required to travel short distances to offices/conference rooms and buildings on site.
This position requires long hours and/or nights/weekend work.
This position requires long periods of sitting or standing.
This position requires communicating with others verbally and/or written.
This position requires working in a stressful environment.
This position requires dealing with conflict.
This position works under pressure and with strict deadlines.
This position requires focus and attention to detail.
Background & Security
Employment is contingent upon successful background investigation
Drug screening may be required for federal contract compliance
Benefits & Perks
We believe in investing in our team-both professionally and personally:
Medical, dental, vision, life, accident, and critical illness insurance
401(k) immediate vesting and match
Paid time off and company holidays
Generous tuition & training support
Relocation assistance
Sign-on and performance-based bonuses
Employee referral program
Access to Tickets at Work, EAP, wellness initiatives, and more
Join Us
If you're driven by mission, technology, and teamwork-we want to hear from you. Cambridge is growing, and this position is just one of many opportunities on our global team. Know someone perfect for the role? Referrals are welcome-both employees and non-employees may qualify for a bonus.
Apply today and help shape the future of secure cloud computing
for national security.
About Cambridge International Systems
At Cambridge, innovation grows through diversity. We are proud to be an equal opportunity employer, committed to creating an inclusive and supportive work environment for all. Learn more at *******************
Auto-ApplyCyber Security Analyst
Cyber security analyst job in Philadelphia, PA
The Naval Surface Warfare Center Philadelphia Division (NSWCPD) is a Department of Defense entity responsible for research and development, test and evaluation, engineering and fleet support organization for the Navy's ships, submarines, military watercraft and unmanned vehicles. This requirement is for NSWCPD Code 20 Land Based Test Site Programs, which is responsible for the support of Risk Management Framework (RMF) package development of all NSWCPD Land Based Test Sites. All test site systems must receive and maintain full RMF Authority To Operate (ATO) to ensure Cyber Security and Information Assurance (IA) Hardening of all Land Based Test Site Systems. Systems in scope are both Ashore and Afloat systems within each Land Based Test Site.
Supporting the information system owner to complete security assessments, achieve system authorizations, continuous monitoring, and configuration management, through eMASS
Verifying patches and virus definitions are updated on the system using existing automated tools
Adhering to pre-defined configuration management and change management policies for authorizing software prior to its implementation on systems
Verifying mitigation and closure of open vulnerabilities following the NSWC change control process
Assessing NSWC systems in accordance with Navy, NIST, DoD, and DISA guidance
Reporting security incidents in accordance with the Command's Incident Response Plan
Ensuring systems are operated, used, maintained, and disposed of in accordance with all applicable security policies and practices
FILLING THIS POSITION IS CONTINGENT UPON AWARD
#LI-LL1
Requirements
Must possess an active Secret clearance at the minimum
A minimum of five (5) years of cybersecurity experience
Must currently hold a DoD 8570-compliant IAT II certification (SSCP or Security+CE with appropriate CE/OS certificate), and IAM II certification (CAP or CASP CE) or be able to obtain within six months; CE/OS certificate may include Windows or Linux
Experience with eMASS and/or Xacta, ACAS/Nessus, SCAP, Benchmarks, STIG Viewer, and POA&Ms
Experience with patching, reviewing system and event logs for operating systems such as Windows and Linux
Must be able to diagnose and solve problems within a computer network
Have knowledge of National Institute of Science and Technology (NIST) and Defense Information Systems Agency (DISA) standards, guidelines, and requirements as related to Cybersecurity and Risk Management
Have experience in reviewing compliance in Microsoft Windows, Red Hat Linux and other operating systems in accordance with DISA and NIST requirements
Have professional communication skills and the ability to express thoughts and ideas clearly and concisely
Must be a team player, dedicated to program support, capable of multitasking and working several
complex and diverse tasks with simultaneous or near simultaneous deadlines
Be a self-starter who is accountable and requires minimal direction and supervision
Be open to new and innovative idea
Desired Skills
Bachelor's degree in information systems, computer science, or similar
Navy Qualified Validator (NQV)
Experience evaluating DISA STIG configurations
Experience with Windows and Linux patching environments
Experience with eMASS
Clearance Information
SRC IS A CONTRACTOR FOR THE U.S. GOVERNMENT, THIS POSITION WILL REQUIRE U.S. CITIZENSHIP AS WELL AS, A U.S. GOVERNMENT SECURITY CLEARANCE AT THE TOP SECRET / SCI LEVEL
Travel Requirements
Up to 10% travel may be required
About Us
Scientific Research Corporation is an advanced information technology and engineering company that provides innovative products and services to government and private industry, as well as independent institutions. At the core of our capabilities is a seasoned team of highly skilled engineers and scientists with multidisciplinary backgrounds. This team is challenged daily to provide cutting edge technology solutions to our clients.
SRC offers a generous benefit package, including medical, dental, and vision plans, 401(k) with a company match, life insurance, vacation and sick paid time off accruals starting at 10 days of vacation and 5 days of sick leave annually, 11 paid holidays, tuition reimbursement, and a work environment that encourages excellence and more. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
EEO
Scientific Research Corporation is an equal opportunity employer that does not discriminate in employment.
All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other protected characteristic under federal, state or local law.
Scientific Research Corporation endeavors to make ************** accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact *************** for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
Auto-ApplyCyber Security Analyst I
Cyber security analyst job in Conshohocken, PA
About Us At Finance of America, we help homeowners unlock the joy that comes from realizing the full potential of their retirement. Many people have significant wealth tied up in their homes and want to use it meaningfully in their next chapter. Our unique range of reverse mortgages allow homeowners 55+ to access that wealth while maintaining control over their home and financial future. With options tailored to their unique goals, we provide the financial flexibility they need to move forward with confidence.
Finance of America is guided by five values: We are customer obsessed, they are why we exist. We raise the bar. We take extreme ownership. We practice genuine collaboration. And we unleash our excellence. Together we are actualizing our vision to be the most beloved brand for homeowners in their next chapter.
To learn more about us, visit ************************
Purpose of Role
Responsible for the monitoring and triage of security alerts, performing initial investigation, documentation, and escalation following Security Operations Center procedures. Provides frontline defense, ensuring timely identification of threats across Finance of America's systems and network.
Key Responsibilities and Expectations
* Monitors security alerts and events across Azure/M365, CrowdStrike Falcon, Elastic/Kibana, and other enterprise security platforms.
* Performs initial triage, classification, and escalation of security events based on established runbooks and Service Level Agreements (SLA).
* Analyzes phishing emails, Endpoint Detection and Response (EDR) alerts, and other security tools data as necessary to respond to security events.
* Utilizes organizational Security Information and Event Management, EDR, and Cloud platforms to perform routine threat hunts to identify and protect Finance of America systems, networks, and users.
* Documents all investigative steps clearly and consistently within JIRA, including timelines, findings, and recommendations.
* Maintains awareness of current threats, attack techniques, and organizational security policies.
* Provides timely communication to senior analysts regarding suspicious activity, potential incidents, and operational risks.
* Follows SOC procedures for incident response, containment actions, and enhanced monitoring tasks.
* Participates in shift turnover briefings, contributes to daily operational reporting, and ensures accurate case hand-off.
* Supports continuous improvement of SOC workflows by identifying false positives, noise reduction opportunities, and detection logic gaps.
* Protects sensitive information and maintains strict confidentiality in all SOC work.
* Performs other duties as assigned.
Reports To
* Director, Security Operations
Qualifications - Experience/Skills/Competencies
* Knowledge of security event triage, threat indicators, and common attack techniques (MITRE ATT&CK familiarity preferred).
* Foundational understanding of networking, operating systems, and security principles.
* Exposure to or strong interest in: Azure/M365 Security (Entra ID sign-ins, Defender alerts, Audit Logs, Conditional Access), CrowdStrike Falcon (detections, host overview, process trees, investigations), Elastic / Kibana (search queries, dashboards, lenses, detection alerts), JIRA (ticket management, documentation, workflow transitions).
* Ability to read and interpret logs from endpoints, cloud systems, email security tools, and authentication platforms.
* Basic understanding of Windows and Linux system behaviors, processes, and common administrative commands.
* Familiarity with phishing indicators, malware behaviors, user account anomalies, and suspicious network activity.
* Ability to research new technologies, techniques, tactics, and incorporate that information into analytical processes.
* Strong analytical thinking and problem-solving skills, including ability to follow playbooks accurately.
* Ability to work in a fast-paced 24/7 SOC environment with shifting priorities and time-sensitive responses.
* Clear written communication for documenting investigations and summarizing findings.
* High attention to detail and disciplined adherence to procedures and evidence-handling standards.
* Willingness to learn new tools, techniques, and detection methods, including shadowing senior analysts and participating in training.
* Ability to work collaboratively with IT, security engineering, incident response, and management teams.
* Ability to multitask, work on multiple events, and communicate with other team members virtually.
* Ability to take initiative, work autonomously, and complete tickets as prioritized.
Qualifications - Education - Required
* Bachelor's Degree or comparable qualifications
Qualifications - Education - Field(s)/Profession(s)
* Cybersecurity, Information Technology, Computer Science, or related field.
Compensation
The base salary range for this position is inclusive of all geographical differences in the labor market. The base salary for the position will be determined based on factors such as the candidate's work location, skills, education, and experience. In addition to those factors, we believe in the importance of pay equity and consider the internal equity of our current team members in determining any final offer. We offer a competitive benefits package including health, dental, vision, life insurance, paid time-off benefits, flexible spending account, 401(k) with employer match, and ESPP.
Additional Information
The above statements are intended to describe the general nature and level of work being performed by people assigned to this classification. They are not to be construed as an exhaustive list of all responsibilities, duties, and skills required of personnel so classified.
Finance of America is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, sex (including pregnancy), sexual orientation, religion, creed, age, national origin, physical or mental disability, gender identity and/or expression, marital status, veteran status or other characteristics protected by law.
Cyber Security Analyst
Cyber security analyst job in Wilmington, DE
Details:
Stefanini Group is hiring!
Exciting opportunity awaits, let us help you get started!
Click Apply now or you may call: **************/ email: Deepak Tyagi (**************************) for faster processing!
Job Description:
The Cyber Monitoring Analyst will be part of the Cyber Operations team that is responsible for monitoring and investigating alerts to identify potential incidents. The individual will be required to work closely with other members of the Cyber Operations team to ensure the successful delivery of the alert monitoring, triage, and escalation. Specifically, the Cyber
Monitoring Associate will have the following key responsibilities:
Perform real-time analysis and correlation of logs/alerts.
Follow detailed operational procedures to appropriately analyze, escalate, and assist in remediation of security events.
Utilize multiple security technologies to investigate and analyses alerts.
Deliver timely and detailed documentation related to any incident including the findings, review, and follow-up activities
Participate in the creation, modification and maintenance of all Cyber Monitoring policies and procedures
Keep abreast of cyber security trends and the emerging threat landscape in general
Details:
What the ideal candidate looks like:
1-4 years of experience in IT, IT Security, Security, Technical helpdesk, Security Operations are preferred
Understanding various Cloud technologies such as Azure, AWS, GCP is highly desirable
Also desirable is if they have performed investigation of high severity threats, in on-Prem technologies or in cloud
Strong oral and written communication skills including the ability to interact directly with individuals that do not have an IT background.
Intermediate knowledge of endpoint and network security concepts and tools preferred.
Knowledge of ServiceNow.
Crowdstrike, highly desired.
Experience with event monitoring and security reporting
Ability to exercise sound technical, interpersonal, and organizational judgment while evaluating and solving complex problems.
*Listed salary ranges may vary based on experience, qualifications, and local market. Also, some positions may include bonuses or other incentives*
About Stefanini Group
The Stefanini Group is a global provider of offshore, onshore and near shore outsourcing, IT digital consulting, systems integration, application and strategic staffing services to Fortune 1000 enterprises around the world. Our presence is in countries like Americas, Europe, Africa and Asia, and more than 400 clients across a broad spectrum of markets, including financial services, manufacturing, telecommunications, chemical services, technology, public sector, and utilities. Stefanini is a CMM level 5, IT consulting, company with global presence. We are CMM Level 5 company.
#LI-DT1
#LI-HYBRID
Easy ApplyInformation Security Specialist - Cyber Resilience
Cyber security analyst job in Mount Laurel, NJ
Hours:
40
Pay Details:
$87,000 - $151,000 USD
TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
Job Description:
The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area.
The role involves designing and implementing cyber resilience strategies, leading initiatives to improve organizational preparedness, conducting risk assessments, and collaborating with various teams to align resilience goals with business objectives. Responsibilities also include developing incident response plans, managing continuity strategies, providing expert guidance during incidents, and delivering training programs to foster a culture of resilience.
Depth & Scope:
Participates on complex, comprehensive or large projects and initiatives
Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors
Has advanced knowledge of organization, technology controls / security/ risk issues
Education & Experience:
Bachelor's degree preferred
Information security certification / accreditation an asset
7+ years of relevant experience
Expert knowledge of IT security and risk disciplines and practices
Preferred Qualification :
Design, develop, and implement comprehensive cyber resilience strategies.
Lead cross-functional initiatives to enhance organizational preparedness against cyber threats and incidents.
Conduct risk assessments and business impact analyses to identify vulnerabilities.
Collaborate with IT, security teams, and business units to align resilience goals with organizational objectives.
Develop and manage incident response plans, continuity strategies, and recovery protocols.
Provide expert guidance during cybersecurity incidents, ensuring rapid response and recovery.
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
Domestic Travel - Occasional
International Travel - Never
Performing sedentary work - Continuous
Performing multiple tasks - Continuous
Operating standard office equipment - Continuous
Responding quickly to sounds - Occasional
Sitting - Continuous
Standing - Occasional
Walking - Occasional
Moving safely in confined spaces - Occasional
Lifting/Carrying (under 25 lbs.) - Occasional
Lifting/Carrying (over 25 lbs.) - Never
Squatting - Occasional
Bending - Occasional
Kneeling - Never
Crawling - Never
Climbing - Never
Reaching overhead - Never
Reaching forward - Occasional
Pushing - Never
Pulling - Never
Twisting - Never
Concentrating for long periods of time - Continuous
Applying common sense to deal with problems involving standardized situations - Continuous
Reading, writing and comprehending instructions - Continuous
Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-ApplyPlatform Engineer - Security
Cyber security analyst job in Camden, NJ
Since 1869 we've connected people through food they love. We're proud to be stewards of amazing brands that people trust. Our portfolio includes the iconic Campbell's brand, as well as Michael Angelo's, Pace, Pacific Foods, Prego, Rao's Homemade, Swanson, and V8. In our Snacks division, we have brands like Cape Cod, Goldfish, Kettle Brand, Lance, Late July, Pepperidge Farm, Snack Factory, and Snyder's of Hanover. Here, you will make a difference every day. You will be supported to build a rewarding career with opportunities to grow, innovate and inspire. Make history with us. Why Campbell's… Benefits begin on day one and include medical, dental, short and long-term disability, AD&D, and life insurance (for individual, families, and domestic partners). Employees are eligible for our matching 401(k) plan and can enroll on the first day of employment with immediate vesting. Campbell's offers unlimited sick time along with paid time off and holiday pay. If in WHQ - free access to the fitness center. Access to on-site day care (operated by Bright Horizons) and company store. Giving back to the communities where our employees work and live is very important to Campbell's. Our "Campbell's Cares" program matches employee donations and/or volunteer activity up to $1,500 annually. Campbell's has a variety of Employee Resource Groups (ERGs) to support employees.
Who we are looking for…
The Campbell's Company is looking for an senior-level Engineer - Information Security to join our critical and highly visible Information Security team. This position will primarily be responsible for managing the lifecycle and effectiveness of key security tools and processes. You will work closely with the Architecture and Risk Management teams to ensure that security controls are in place and appropriately managing risk throughout the Information Technology, Operational Technology, and Cloud environments.
What you will do…
Essential responsibilities will include but not be limited to:
* Design, deploy, and integrate security tools and processes
* Design, deploy, integrate Privilege Access Management (PAM) services for Linux and Windows environments
* Experience in developing, testing, and deploying ZeroTrust security strategies focused on identity, device, and network contexts
* Cloud (Azure / AWS) security engineering
* Develop and implement automation strategies tied to both administrative maintenance of the environment, as well as contribute to the overall detection engineering efficiency
* Active Directory security hardening
Job Complexity
* Manage multiple, concurrent project and task assignments, placing proper priorities on tasks and attention to detail to follow through all assignments to completion
* Create and manage the lifecycle of documentation to support the architecture and operations of security systems
* Continuously improve operational playbooks and knowledge transfer material to enable operational support teams to handle increasingly complex tasks to enable Engineering time is focused on the most valuable work
* Serve as an incident escalation point
* Provide thought leadership and communications expertise in the development of policies, standards, procedures, and other communication for the department
* Provide thought leadership on key performance indicators for measuring success objectively
* Integrate existing and new tools and supporting resources into our security intelligence platform, with the goal of deriving actionable data
* Keep current with the latest news and events surrounding cyber threats and security
* Evaluate new technologies and processes that enhance security capabilities
What you bring to the table… (Must Have)
* Bachelor's degree in a computer science or information technology discipline
* 5+ years of relevant work experience, including:
* 2 years of experience as an Information Security Analyst with experience within at least two of the following disciplines: networking, system hardening, identity and access management, or privileged access management
* 1 year of experience in system or firewall administration
* Deep understanding of Linux identity engineering and administration
* 2 years of experience working with privileged access management platforms across Windows, Linux, network device, and containerized platforms
* Significant experience working with automation scripting leveraging at least 3 of the following: python, PowerShell, API based integrations, and no/low-code workflow automation platforms.
* Strong knowledge of L4-L7 protocols such as SSL, HTTP, DNS, SMTP, and IPsec
* Deep understanding of TCP/IP, computer networking, routing, and switching, and encryption technologies and standards
* Knowledge of identity and access management principles (SSO, MFA, ModernAuth)
It would be great if you have… (Nice to Have)
* CISSP certification is a plus
* Cloud security experience is a plus
* Conceptual understanding of the Cyber Kill Chain and MITRE ATT&CK framework
* Experience with Manufacturing environments is a plus
* Experience with leveraging LLM's or statistical analysis to drive operational insights
* Strong capacity to understand vectors and the risks associated with them
* Experience with deploying and managing distributed architecture layer 7 firewalls
* Experience with IDS/IPS, penetration and vulnerability testing
* Strong security policy knowledge and experience
* Strong ability to clearly communicate and document complex concepts
* Data protection tools and processes - Data Loss Prevention [DLP], Rights Management Services [RMS], Cloud Access Security Broker [CASB]
More about the job…
* This position reports to the Senior Manager for Security Architecture and Engineering
Compensation and Benefits: The target base salary range for this full-time, salaried position is between
$131,400-$188,900
Individual base pay depends on work location and additional factors such as experience, job-related skills, and relevant education or training. Total pay may include other forms of compensation. In addition, we offer competitive health, dental, 401k and wellness benefits beginning on the first day of employment. Please ask your Talent Acquisition Partner for more information about our total rewards package.
The Company is committed to providing equal opportunity for employees and qualified applicants in all aspects of the employment relationship, including consideration for employment, without regard to race, color, sex, sexual orientation, gender identity, national origin, citizenship, marital status, protected veteran status, disability, age, religion, or any other classification protected by law.
Auto-ApplyCyber Security
Cyber security analyst job in Philadelphia, PA
Job Description
Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
Responsibilities:
Engineer, implement and monitor security measures for the protection of computer systems, networks and information
Develop and implement security policies and controls to support the Cyber Security framework
Manage the existing cyber security training program across global, multilingual business
Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements
Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
Continuous improvement in the areas of Information Security technologies, techniques and processes
Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
Ability to interpret penetration test results and describe issues and fixes to non-security expert
Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap
Skills & Experience
Bachelor's degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
Certified Information Systems Security Professional (CISSP)
8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
Vulnerability Assessment testing and/or Penetration Testing (preferred)
Robotic Process Automation/Intelligent Automation (preferred)
Business case development supporting security technology solutions (preferred)
Additional certifications demonstrating cybersecurity/technical mastery (preferred)
Lead Security Analyst - Incident Response
Cyber security analyst job in Camden, NJ
Since 1869, we've connected people through food they love. We're proud to be stewards of amazing brands that people trust. Our portfolio includes the iconic Campbell's brand, as well as Cape Cod, Chunky, Goldfish, Kettle Brand, Lance, Late July, Pacific Foods, Pepperidge Farm, Prego, Pace, Rao's Homemade, Snack Factory, Snyder's of Hanover. Swanson, and V8.
Here, you will make a difference every day. You will be supported to build a rewarding career with opportunities to grow, innovate and inspire. Make history with us.
Why Campbell's…
Benefits begin on day one and include medical, dental, short and long-term disability, AD&D, and life insurance (for individual, families, and domestic partners).
Employees are eligible for our matching 401(k) plan and can enroll on the first day of employment with immediate vesting.
Campbell's offers unlimited sick time along with paid time off and holiday pay.
If in WHQ - free access to the fitness center. Access to on-site day care (operated by Bright Horizons) and company store.
Giving back to the communities where our employees work and live is very important to Campbell's. Our “Campbell's Cares” program matches employee donations and/or volunteer activity up to $1,500 annually.
Campbell's has a variety of Employee Resource Groups (ERGs) to support employees.
How you will make history here…
As a key member of Campbell's Cybersecurity Incident Response Team this individual will be responsible for detection, validation, containment, remediation, and communication for cybersecurity events and incidents such as malware infections, potential system compromises, Distributed Denial of Service (DDoS) attacks, and privacy breaches. This individual will be a key member on a team responsible for the rapid response and resolution of security incidents across the Campbell footprint including on-premises, the Cloud, and third-party hosted applications. This role involves working with internal and external teams to identify root causes, restore services and communicate status to affected stakeholders. In addition, the individual will be involved in activities to improve the security posture and incident response capabilities of the organization including process automation, purple team testing, metrics reporting and threat hunting.
What you will do…
50% - Incident Response
Perform cybersecurity incident response including security event analysis, incident handling, reporting, and threat analysis. The role involves coordination with Campbell's third-party Managed Security Services Provider (MSSP), internal information technology teams and other parties who may be engaged in the event of a cybersecurity event or incident.
Analyze and triage events, anomalies, and incidents to ensure appropriate identification of risk to company systems and information whether on-premises, in the Cloud or managed by a third party.
Lead, oversee and participate in the forensic analysis of cybersecurity incidents.
Communicate and coordinate response efforts including working with the third-party MSSP, Information Technology teams, Business Leaders, Legal, Chief Security Officer and other Third Parties to mitigate the impact of a security or privacy breach.
Prepare situation reports, escalate to leadership, and perform root cause analysis.
Develop and report KPI's to enable continuous improvement of information security risk management controls.
25% - Enhance/Implement Capabilities to Strengthen Detection and Response Capabilities
Share lessons learned from incident response and threat hunting to strengthen detection and response capabilities.
Model insider and external threats to Campbell's systems and data.
Assess existing detection and response capabilities and provide recommendations for improvement.
Leverage security orchestration (SOAR) to automate security response procedures.
Maintain and enhance security monitoring and incident response procedural documentation.
Partner with the third-party MSSP to develop KPI's for management.
Validate the efficacy of security monitoring through attack simulation and purple team testing.
Leverage lessons learned, threat modelling and emerging industry better practice, to analyze the effectiveness of the existing program (policies, technology, and awareness) to continuously improve the detection and response capabilities of the organization.
Partner with Security Business Analysts, Security Architects to identify security logging and monitoring requirements for new initiatives especially those with privacy implications.
25% - Threat Intelligence and Threat Hunting
Proactively seek to uncover indicators of compromise that will identify whether Campbell's systems have been breached.
Collect and aggregate threat intelligence from a wide variety of sources and assess for relevance to Campbell's environment.
Create hypotheses for analytics and testing of threat data.
Partner with the third-party MSSP, Threat Intelligence firms and other parties to identify threats that may impact Campbell.
Job Complexity:
Appropriately balances security risk and business impact to ensure effectiveness of detection and response controls. To be effective the position must partner with third parties, business analysts, internal and external stakeholders.
Ability to analyze threat intelligence data to develop strategic plans and budget to address emerging risk.
Ability to build operational processes using industry best-practice that are tailored to Campbell's organization, system, and processes.
Ability to effectively communicate risk including corrective action plans/recommendations to non-technical audiences including Campbell's Executives and the Board of Directors.
Ability to create effective reports and presentations tailored to different audiences to ensure transparency and understanding of the program.
Ability to gather information from multiple sources to quickly assess the impact of a potential security event/breach within the environment.
Translate security events into non-technical language for leadership.
Ability to analyze and identify tasks suitable for automation.
What you bring to the table…
7-10+ years in Information Security
5+ yrs in Incident Response
Strong analytical skills including the ability to assess the severity and impact of a security incident.
High level of technical expertise in information security, including deep familiarity with relevant penetration and intrusion techniques and attack vectors.
Demonstrated ability to collaborate effectively with operational teams internally and with a third-party Managed Security Services Provider (MSSP).
Excellent investigative skills, insatiable curiosity, and an innate drive to win.
Instinctive and creative, with an ability to think like the enemy
Ability to demonstrate strong computer knowledge of network protocols, desktops, servers, cloud and software as a service technology.
Experience with Security Information and Event Management (SIEM) platforms, next generation firewalls, email security platforms, Endpoint detection and response technologies, Data Loss Prevention Software, Web Proxies, and Web Application Firewalls.
Familiarity with common scripting languages like Python and/or Powershell.
Familiarity with commonly deployed information technology resources including email, web, network, workstation and servers.
Strong problem-solving and trouble-shooting skills
Self-motivated and able to work independently.
Strong written and verbal communication skills.
Compensation and Benefits:
The target base salary range for this full-time, salaried position is between
$131,400-$188,900
Individual base pay depends on work location and additional factors such as experience, job-related skills, and relevant education or training. Total pay may include other forms of compensation. In addition, we offer competitive health, dental, 401k and wellness benefits beginning on the first day of employment. Please ask your Talent Acquisition Partner for more information about our total rewards package.
The Company is committed to providing equal opportunity for employees and qualified applicants in all aspects of the employment relationship, including consideration for employment, without regard to race, color, sex, sexual orientation, gender identity, national origin, citizenship, marital status, protected veteran status, disability, age, religion, or any other classification protected by law.
Auto-ApplySecurity Analyst
Cyber security analyst job in Philadelphia, PA
Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs.
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Job Details:
Title: Security Specialist
Location: Philadelphia, PA
Duration: 3 month (may extend)
Division: Intellectual Property and Science
Required Skills:
• Active Secret clearance (Public Trust) required.
• Provide security technical advisory and directions to technical and research teams
• Maintain operational security posture for the program to ensure government information security requirements and information systems security policies, standards, and procedures are established and followed.
• Assist with the management of security aspects of the information system and performs day-to-day security operations of the system.
• Evaluate security solutions to ensure they meet security requirements for processing classified information.
• Prepare Standard Operating Procedures that meet the security requirements for the business' clients
• Perform vulnerability/risk assessment analysis to support certification and accreditation.
• Provides configuration management (CM) for information system security software, hardware, and firmware.
• Manage changes to system and assesses the security impact of those changes.
• Experience and familiarity with securing Windows Environments, MS SQL Servers, Web Servers, Encryption, and Access Control.
• Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, etc.
• Experience and/or familiarity with Certification and Accreditation (C&A).
• Experience and/or familiarity with the following network protection devices: Firewalls, intrusion detection and prevention systems (IDS/IPS), log analysis, malware analysis, network traffic flow and packet analysis
• Experience and/or familiarity with NIST Guidelines, FIPS 140-2, FIPS 190 , FedRAMP, Federal Information Security Management Act (FISMA) and other tools using industry best practices.
Additional Information
To know more on this position or to schedule an interview please contact;
Monil Narayan
************
Epic Security & Providers - Analyst
Cyber security analyst job in Wilmington, DE
Job Details
Applicants must be currently authorized to work in the United States. ChristianaCare will not sponsor applicants for this position for an employment visa now or in the future.
Why ChristianaCare
Do you want to work at one of the Top 100 Hospitals in the nation? We are guided by our values of Love and Excellence and are passionate about delivering health, not just health care. Come join us at ChristianaCare!
ChristianaCare, with Hospitals in Wilmington and Newark, DE, as well as Elkton, MD, is one of the largest health care providers in the Mid-Atlantic Region. Named one of “America's Best Hospitals” by U.S. News & World Report, we have an excess of 1,100 beds between our hospitals and are committed to providing the best patient care in the region. We are proud to that Christiana Hospital, Wilmington Hospital, our Ambulatory Services, and HomeHealth have all received ANCC Magnet Recognition .
ChristianaCare Offers
Medical, Dental, Vision, Life Insurance, etc.
Two retirement planning offerings, including 403(b) with company contributions.
Generous paid time off with annual roll-over and opportunities to cash out.
12-week paid parental leave
Tuition assistance
Incredible Work/Life benefits including annual membership to care.com, access to backup care services for dependents through Care@Work, retirement planning services, financial coaching, fitness and wellness reimbursement, and great discounts through several vendors for hotels, rental cars, theme parks, shows, sporting events, movie tickets and much more!
Why Epic
The electronic health record (EHR) is foundational to the care we provide because it centralizes patient information, enabling informed decision-making and seamless care coordination. The EHR supports our ability to deliver high-quality, equitable, accessible care.
ChristianaCare is excited to transition from Cerner to Epic as the EHR across our sites of care!
This role is a HYBRID position requiring frequent on-site work. Must be within a commutable distance.
Epic certification preferred; if not certified, must become Epic certified within 3 weeks of completing the mandatory Epic training sessions.
Education and Experience Requirements:
Bachelor's degree in Information Technology, Computer Science, Healthcare Administration, or a related field is preferred.
2 - 3 years of experience working with Epic systems or similar EHR platforms preferably in security analysis or a related field.
High School diploma with 5 years of related experience may be considered in lieu of bachelor's degree.
Epic Security Coordinator Certification preferred.
Relevant certifications in healthcare security management are highly desirabl
Principal Duties and Responsibilities:
Provisions application security levels and roles.
Establishes ownership of each particular security class.
Coordinates security template and role updates and establishes a security change control process.
Coordinates security‐related activity across physical ﴾buildings, grounds﴿, infrastructure ﴾network, servers, operating system﴿ and application ﴾Epic or non‐Epic﴿ teams.
Works with application and compliance teams to design system‐level access.
Creates user records and maps them to templates built by application coordinators/analysts.
Creates appropriate shared security classifications which do not have specific application ownership.
Creates and maintains procedures to activate, deactivate, and update user records.
Understands the Epic software security structures, including user profiles, roles, and security classes
Serving as the main point of contact for technical issues and general questions related to assigned applications
Working in collaboration with Epic to implement new projects ﴾such as a new module﴿
Managing upgrades of assigned applications with Epic by setting timelines, maintaining continuous communication, and addressing issues
Analyzing and communicating the impact of issues
Triaging requests and determining the priority of issues
Resolving end‐user application issues using Epic documentation and ensuring business needs are met
Escalating end‐user problems to the appropriate level ﴾such as team lead﴿ when necessary
Validating solutions are complete and appropriately implemented
Building relationships with end users and providing consistent support through day‐to‐day communication
Communicating problem status and solutions to end users
#LI-CD1
Annual Compensation Range $79,497.60 - $127,212.80This pay rate/range represents ChristianaCare's good faith and reasonable estimate of compensation at the time of posting. The actual salary within this range offered to a successful candidate will depend on individual factors including without limitation skills, relevant experience, and qualifications as they relate to specific job requirements.
Christiana Care Health System is an equal opportunity employer, firmly committed to prohibiting discrimination, whose staff is reflective of its community, and considers qualified applicants for open positions without regard to race, color, sex, religion, national origin, sexual orientation, genetic information, gender identity or expression, age, veteran status, disability, pregnancy, citizenship status, or any other characteristic protected under applicable federal, state, or local law.
Post End Date
Jan 10, 2026
EEO Posting Statement
ChristianaCare offers a competitive suite of employee benefits to maximize the wellness of you and your family, including health insurance, paid time off, retirement, an employee assistance program. To learn more about our benefits for eligible positions visit *********************************************************
Auto-ApplyCyber Security Engineer
Cyber security analyst job in Philadelphia, PA
Paragon Cyber Solutions is seeking a highly skilled and mission-driven Cyber Security Engineer to join our team in support of a critical defense program based at the Naval Surface Warfare Center Philadelphia Division (NSWCPD).
As the Cyber Security Engineer, you will play a central role in the development, implementation, and oversight of information security policies, procedures, and systems to ensure the integrity, confidentiality, and availability of mission-critical systems. You will provide strategic leadership for cybersecurity compliance across the program and support certification and accreditation activities in accordance with DoD and NIST frameworks.
Clearance
Active Secret Clearance
Requirements
Essential Functions
Conduct security assessments and audits using tools such as DISA eMASS and ACAS to identify vulnerabilities, evaluate controls, and ensure compliance with DoD standards.
Prepare and maintain security documentation, including System Security Plans (SSPs), risk assessments, and Plans of Action and Milestones (POA&Ms), to support accreditation and authorization processes.
Responsible for Assured Compliance Assessment Solution (ACAS) configuration, implementation, and scans.
Hands on configuration experience with ESXi, VMWare, Linux, Windows AD, SCAP, and remediating STIG findings.
Provide remediation of vulnerabilities identified on infrastructure devices.
Identify what cybersecurity STIG, checklist, or control requirements apply during the development of new components and software that is implemented into the enterprise infrastructure.
Knowledge of Identity, Credential, and Access Management (ICAM) and Zero Trust Architecture (ZTA) a plus.
Perform other duties as assigned.
Required Skills
Experience in implementing and enforcing application cybersecurity and vulnerability management.
Required Experience
Bachelor's degree in Cybersecurity, Information Technology, Computer Science or related field; or equivalent combination of education and experience.
Five (5) years or more of Cybersecurity related experience (hands on security engineering).
Assured Compliance Assessment Solution (ACAS) experience is mandatory.
Experience conducting Information Systems vulnerability assessment, risk mitigation, and application of mitigation strategies.
Understanding of RMF, eMASS, POA&Ms, ACAS, and Vulnerability Management.
Additional Eligibility Qualifications
DoD 8570 IAT II or IAM II Certified (Security+ CE or equivalent) required or higher.
Benefits
Health Care Plan (Medical, Dental & Vision).
Retirement Plan (401K w/ employer matching).
Paid Time Off & 11 Paid Holidays.
Short and Long-Term Disability.
Healthy Work-Life Balance.
Training & Development.
Why Work For Paragon Cyber Solutions?
You want to make a difference. You want to be recognized by name versus being a number. You want to work with a company where you can grow and work in different areas to increase your knowledge/experience. You have an entrepreneurial spirit and need to live it.
As a small business, each team member rolls up their sleeves and helps where needed (including our CEO). Our ideal candidate will be comfortable with multi-tasking and prefers working in a fast-paced, dynamic environment. You must be adaptable to the needs of a growing business.
A Model of Excellence
That's our motto in all we do and what we seek in our team members.
Are you a hardworking professional seeking a new opportunity that fosters growth? Look no further!
We are an award winning minority, woman, veteran-owned, 8(a), EDWOSB, VOSB, certified Tampa, FL-based small business. We pride ourselves on delivering high-quality solutions that help our clients protect the integrity of their business operations.
Auto-ApplyInformation System Security Officer (ISSO) III
Cyber security analyst job in Philadelphia, PA
Full-time Description
Leading with our people, Digital Consultants' mission is to deliver the highest level of professional solutions while being a trusted partner and advisor to our customers. With a culture of practicality, opportunity, and creativity, we remain committed to upholding honesty, trust, respect, and ethical standards in all our endeavors. We are a certified SBA 8(a) small, disadvantaged business that supports multiple IT customers within the Federal, civilian, and private sectors. Digital Consultants also offer our employees growth opportunities, competitive wages, and a full benefits package. Our founding principles, Fairness and Common Sense, make working here more than a job; it's the Digital family.
Digital Consultants seeks an Information System Security Officer (ISSO) III who provides cybersecurity support and oversight for Navy systems in accordance with DoD Risk Management Framework (RMF) and Navy Cybersecurity policies. The ISSO assists the ISSM in ensuring system compliance, maintains RMF package documentation, and supports vulnerability management and cybersecurity reporting in support of NSWCPD Code 104.
Duties to include:
Support the Information System Security Manager (ISSM) in all aspects of system cybersecurity compliance and accreditation.
Develop, review, and maintain RMF accreditation packages, including System Security Plans (SSPs), Security Control Traceability Matrices (SCTMs), POA&Ms, and Continuous Monitoring strategies.
Ensure implementation and validation of security controls in accordance with NIST SP 800-53, DoD 8510.01 (RMF), and Navy SCA business rules.
Monitor systems for vulnerabilities, review STIG and SRG scan results, and track remediation in eMASS/VRAM.
Conduct and document security incident response actions and report to the ISSM.
Provide cybersecurity status reporting, technical risk analysis, and compliance metrics to leadership.
Coordinate with system administrators, engineers, and Navy program offices to ensure security requirements are integrated into system lifecycle management.
Requirements
Clearance: Top Secret, US Citizen only
Education: Bachelor's Degree in Computer Science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited college or university.
Certifications: DoD 8570/8140 IAM Level II (CAP, CASP+ce, CISM, CISSP, GSLC, CCISO, HCISPP) OR IAT Level II baseline certification (CCNA-Security, CySA+, GICSP, GSEC, Security+ce, CND, SSCP)
Experience: Minimum 7 years of cybersecurity or A&A experience, with at least 5 years as an ISSO or equivalent security role. Experience must include:
Developing and maintaining RMF lifecycle documentation.
Assessing and validating implementation of security controls.
Conducting risk and vulnerability reviews, documenting results, and supporting system accreditation.
Expert knowledge of DoD RMF, NIST SP 800-53, and Navy cybersecurity compliance processes.
Proficiency in eMASS, ACAS, VRAM, and DISA STIG compliance tools.
Ability to coordinate across engineering, operations, and program management teams to resolve cybersecurity issues.
Ability to work on-site at NSWCPD Philadelphia and travel CONUS as required.
The candidate must, with or without reasonable accommodation, be able to sit, stand, use computers and monitors, and perform duties in an office environment for extended periods. The candidate must be able to lift up to 40 lbs. on occasion (e.g., moving a case of paper or similar task) that may occur occasionally.
Digital Consultants, an inclusive and welcoming company, is fully committed to hiring and retaining a diverse workforce without regard to race, color, religion, sex (including pregnancy, gender identity, and sexual orientation), genetic information, national origin, age (40 or older), disability, veteran status or any other protected characteristic.
We provide reasonable accommodation to individuals who require assistance at any stage of the employment process. If you need assistance navigating Digital Consultants' job openings or applying for a position, please email ************************** or call ************. Please provide your contact information so we can assist you.
Salary Description $130,000 - 170,000
Information Security Engineer
Cyber security analyst job in King of Prussia, PA
**Job Number:** JO-2510-11111 **Employee Group:** Regular **Shift:** Day **Travel:** 0% **Site Name:** Remote **Is Remote Eligible:** Yes **Pay:** $75,300.00 - $127,900.00 per year Share (*********************************************************************** ||Email this job
At Radial, our employees are the forefront of ecommerce, bringing beloved brands to consumers through our fulfillment and technology solutions. We are fueling the future of retail, which means you are, too. When you work for Radial, you join a global community of changemakers, where the work is critical, and the culture is fun. We depend on our workforce to overcome real-world challenges every day and encourage you to carve your own career path while shaping our future together. We currently have an exciting opening for an **Information Security Engineer** .
Radial is the pre-eminent B2C eCommerce fulfillment solutions provider powering some of the world's best customer experiences,specializing in tailored, scalable eCommerce fulfillment solutions for mid-market and enterprise brands. Click Here to Learn More About Radial (************************
**Role Summary:**
The Information Security Engineer is responsible for implementing and maintaining Radial's security architecture, including procedures, to ensure the security and compliance of Radial's infrastructure and services. This involves collaborating with various stakeholders across the organization to identify security risks, deploy effective solutions, and ensure compliance with relevant regulations and standards.
**Responsibilities:**
+ Assist in the design and implementation of security controls to address risks in the environment. This includes, but not limited to, the configuration and management of Web Application Firewalls, IDS/IPS, SIEM, NextGen AV, Application Security, and Vulnerability Management.
+ Identify and mitigate vulnerabilities within the network, system, and application environment.
+ Assist in creating appropriate disaster recovery documentation for security controls.
+ Troubleshooting of issues and testing across multiple platforms and applications.
+ Triage and drive vulnerability issues to a thorough, immediate, and effective conclusion.
+ Respond to security incidents in a timely manner and conduct root cause analysis, implementing corrective actions to prevent future occurrences.
+ Review security requirements at relevant phases for both technical and operational perspective for new and existing projects.
+ Identifies, implements, and monitors best practices for information security architecture.
+ Assist with the documentation and review of policies, procedures, and standards.
+ Interfaces with user community and assists with IT risk and security needs.
+ Ensures that the user community understands and adheres to necessary procedures.
+ Create security architecture diagrams, standards, and procedures as appropriate.
+ Performs other duties as required.
**Qualifications:**
+ In-depth understanding of common operating systems, networking technologies, application security, and cloud architecture.
+ Excellent aptitude for IT Risk & Compliance concepts and methodologies.
+ Hands-on cybersecurity troubleshooting experience.
+ Demonstrated knowledge and understanding of information technology industry trends and emerging technologies and an ability to relate them to the company and its objectives.
+ Familiar with IT policies, laws, standards and frameworks applicable to the specific technical role.
+ Experience managing vulnerability management platforms.
+ Working Technical knowledge of CIS baseline standards and enforcement.
+ Hands-on experience implementing and maintaining Proofpoint or equivalent email security tools.
+ In-Depth knowledge of application and cloud-based security.
+ Hands-on experience managing End point security products.
+ Deep understanding of Active Directory.
+ Working technical knowledge of Identity and access management.
+ Working knowledge of ticketing and change management software.
**Minimum Experience and Education**
+ 5+ years of hands-on experience in an internal or third-party IT information security engineering role is preferred.
+ Bachelor's Degree or equivalent experience is preferred.
+ Relevant industry Security certification preferred.
**Travel:**
+ This position is remote.
+ Travel is not required.
**Benefits**
+ Opportunities to develop and explore career advancement
+ Competitive benefits package including medical, dental, vision, paid life insurance and disability, employer HSA funding
+ Family planning coverage, including Fertility & Adoption benefits
+ 401K matching after 6 months with immediate vesting
+ Generous PTO
+ Educational assistance and more!
Radial is an Equal Opportunity Employer and does not discriminate based on race, color, religion, sex, sexual orientation, gender identity or expression, national origin, age, disability, veteran status, marital status, or based on an individual's status in any other group or class protected by applicable federal, state or local law.
Radial is committed to ensuring that its online application process provides an equal employment opportunity to all job seekers, including individuals with disabilities. If you believe you need a reasonable accommodation in order to search for a job opening or to submit an application, please contact us by emailing *********************** . We will work to assist disabled job seekers whose disability prevents them from being able to apply online.
Want to join an organization with an inclusive work culture? No need to look any further. Apply now!
Click Here for All Open Jobs at Radial (************************************************
Access this link to review our privacy notice:Radial, Inc. Privacy Notice for Candidates | Radial (**********************************************************************
Would you like to apply to this job?
Apply for the Information Security Engineer position
Radial is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
Radial is committed to ensuring that its online application process provides an equal employment opportunity to all job seekers, including individuals with disabilities. If you believe you need a reasonable accommodation in order to search for a job opening or to submit an application, please contact us by emailing *********************** . We will work to assist disabled job seekers whose disability prevents them from being able to apply online.
Analyst III - Information Security
Cyber security analyst job in Conshohocken, PA
Our team members are at the heart of everything we do. At Cencora, we are united in our responsibility to create healthier futures, and every person here is essential to us being able to deliver on that purpose. If you want to make a difference at the center of health, come join our innovative company and help us improve the lives of people and animals everywhere. Apply today!
Job Details
Job Description for IAM Hygiene Analyst III role
This role is responsible for supporting the Execution and Improvement of IAM operations across the enterprise, specifically within the IAM Hygiene space. This role will assist with continuously detecting, remediating, and preventing identity-related risks by maintaining accurate, minimal, and secure identity data, access configurations, and authentication mechanisms, as well as assisting with other IAM Governance related functions where needed. The Analyst II will be responsible to generate possible hygiene actions (hypotheses), using approved Cencora tooling, to proactively identify and escalate potential identity-related control gaps, data integrity issues, process deficiencies, and other hygiene concerns; collaborate with stakeholders to validate gaps, evaluate root causes and drive timely remediation.
This role is key to creating and maintaining a mature IAM Hygiene function to ensure access is controlled, organized, and following the concept of “least privilege”. The ideal candidate will have hands-on experience remediating identity and access related risks.
This role works closely with more senior IAM analysts, engineers, and business stakeholders to ensure secure and efficient access to systems and data. The Analyst II also supports the development of IAM procedures, participates in user support and troubleshooting, and contributes to continuous improvement efforts. They are expected to demonstrate learning agility, attention to detail, and a strong commitment to operational excellence and user experience.
Primary Duties and Responsibilities:
Identify and take appropriate actions around unused or stale accounts.
Identify and take appropriate actions around unused or stale accounts.
Ensure Policies and Control Standards are being followed and work toward training, awareness, and resolution where gaps are identified.
Monitor and analyze identity-related activities to identify and remediate risky accounts, authorizations, and configurations, ensuring compliance with policies.
Assist in the development and maintenance of comprehensive processes for identity threat detection and response, including the creation of runbooks and workflows.
Collaborate with cross-functional teams to evaluate and align on identity analytics tools and data structures to enhance IAM capabilities.
Develop and track key performance indicators (KPIs) and key risk indicators (KRIs) for IAM hygiene, providing insights and recommendations to improve identity management practices.
Support the establishment of a culture of continuous improvement by leveraging incident learnings to refine IAM processes and protocols.
Ensure Policies and Control Standards are being followed and work toward training, awareness, and resolution where gaps are identified.
Qualifications:
4+ years of experience IAM or related field
1+ years in an IAM Hygiene or IAM Governance role
Bachelors degree or equivalent experience
Skills and Knowledge:
Behavioral:
Strong understanding of IAM concepts, practices, and technologies including Least Privilege, Privileged Access Management (PAM), Identity Lifecycle management and access controls
Familiarity with SailPoint
Familiarity with Axonius (preferred)
Familiarity with NIST framework
Strong analytical and problem-solving skills, with the ability to interpret data and make informed decisions.
Ability to operate independently and within a team structure
Effective communication and collaboration skills
Strong time management, with ability to multi-task and shift from task to task effectively in a fast-paced environment.
Technical Skills:
IAM Lifecycle and Access provisioning
Authentication Support (MFA and SSO)
IAM Policy and Standards (NIST, ISO 27001, HITRUST)
IT Risk and Compliance Awareness
Root Cause Analysis and Incident Support
Reporting and Documentation
Threat Monitoring and Alert Response
Tools Knowledge:
IAM Platforms (e.g., SailPoint, Saviynt, Okta, Ping Identity)
Directory Services (Active Directory, Azure AD)
ITSM Tools (e.g., ServiceNow)
Security Tools (SIEM, EDR, SOAR)
Programming/Scripting (e.g., Python, PowerShell, SQL)
Microsoft Office Suite
What Cencora offers
We provide compensation, benefits, and resources that enable a highly inclusive culture and support our team members' ability to live with purpose every day. In addition to traditional offerings like medical, dental, and vision care, we also provide a comprehensive suite of benefits that focus on the physical, emotional, financial, and social aspects of wellness. This encompasses support for working families, which may include backup dependent care, adoption assistance, infertility coverage, family building support, behavioral health solutions, paid parental leave, and paid caregiver leave. To encourage your personal growth, we also offer a variety of training programs, professional development resources, and opportunities to participate in mentorship programs, employee resource groups, volunteer activities, and much more. For details, visit **************************************
Full time Equal Employment Opportunity
Cencora is committed to providing equal employment opportunity without regard to race, color, religion, sex, sexual orientation, gender identity, genetic information, national origin, age, disability, veteran status or membership in any other class protected by federal, state or local law.
The company's continued success depends on the full and effective utilization of qualified individuals. Therefore, harassment is prohibited and all matters related to recruiting, training, compensation, benefits, promotions and transfers comply with equal opportunity principles and are non-discriminatory.
Cencora is committed to providing reasonable accommodations to individuals with disabilities during the employment process which are consistent with legal requirements. If you wish to request an accommodation while seeking employment, please call ************ or email ****************. We will make accommodation determinations on a request-by-request basis. Messages and emails regarding anything other than accommodations requests will not be returned
Affiliated CompaniesAffiliated Companies: AmerisourceBergen Services Corporation
Auto-ApplySenior Security Analyst
Cyber security analyst job in Berwyn, PA
Envestnet is seeking a Senior Security Analyst to join our Enterprise Security team. This is a hybrid role, with in-office work required at our Berwyn, PA office location.
Envestnet is transforming the way financial advice is delivered through its connected technology, advanced insights, and asset management solutions - backed by industry-leading service and support. Since 1999, Envestnet has served the wealth management industry and today supports trillions in platform assets, serving over a hundred thousand financial advisors. The vast majority of the nation's leading banks, the largest wealth management and brokerage firms, and over 500 of the largest RIAs rely on Envestnet's wealth management platform and solutions to drive business growth, boost productivity, and deliver better financial outcomes for their clients.
Envestnet's Strategy:
Deliver the industry-leading wealth management platform, powered by advanced data and insights
Leverage our scale and efficiencies to serve our clients' needs comprehensively
Enable financial advisors to deliver more holistic advice - reflecting a more complete view of their clients' financial lives, and in a more connected environment
For more information, please visit ******************
Job Summary:
We are seeking a highly skilled and experienced Senior Security Analyst to join Envestnet's Cyber Defense Team. This role will report into the Director of Security Operations. In this pivotal role, you will be entrusted with safeguarding our organization's assets through leading incident response, conducting thorough security triage and analysis, Vulnerability assessment, Threat Hunting, Security response Automation and continuously enhancing our overall security framework. As a vital member of our team, you will contribute significantly to the development and maintenance of our Security Operations Center (SOC) processes and procedures.
The ideal candidate will possess extensive experience in cybersecurity, exceptional analytical skills, and a demonstrated ability to effectively manage and resolve intricate security incidents. This position is fundamental to our mission of fortifying our security posture and ensuring the protection of our critical assets.
Job Responsibilities:
Lead and manage all stages of the incident response lifecycle, which includes detection, analysis, containment, eradication, recovery, and post-incident review. Prepare comprehensive incident reports and effectively communicate findings to both technical and non-technical stakeholders.
Perform in-depth analysis of security events, alerts, and logs from various tools such as SIEM, EDR, IDS/IPS, and firewalls to identify and investigate potential threats. Update and implement incident response playbooks and procedures to ensure the efficient and effective handling of security incidents. Streamline and automate detection and prevention processes to enable rapid response, consistent triage, and swift root cause analysis and recovery.
Contribute to the development and fine-tuning of the EDR platform, automating incident triage and response tasks using SOAR to create state-of-the-art detection capabilities. Ensure alignment of security operations and detection platforms with industry-standard frameworks such as MITRE ATT&CK and NIST CSF.
Manage the relationship with the MDR vendor, tracking performance against SLAs and key performance indicators (KPIs). Conduct regular reviews of reports, incident trends, and feedback from internal teams.
Conduct vulnerability assessments and gap analyses to determine security weaknesses in systems, applications, and networks. Collaborate with workload owners and cross-functional teams to coordinate remediation activities.
Engage in proactive threat and vulnerability searches, leveraging threat intelligence and Envestnet's network knowledge. Collaborate with the offensive security team on Breach and Attack Simulation (BAS) platform exercises. Automate repetitive searches using various tools, monitor threat actor tactics, and manage simulated cyber-attacks based on prioritized threats.
Participate in the evaluation, selection, and implementation of new security technologies and solutions.
Assist in writing best practice procedures for services such as incident analysis, incident response coordination, security audits or assessments, certificate authority, log analysis and diagnostics, and host vulnerability scanning. Implement end-point security using EDR, EPM, and AV tools.
Adherence to and application of Envestnet legal, compliance, risk, business continuity and administrative policy within the role and department(s) including the timely completion of training & awareness, affirmations and testing as requested.
As part of the responsibilities for this role, you will understand and readily support Envestnet's established corporate business practices, policies, internal controls and procedures designed to create value or minimize risk
Required Qualifications:
Bachelor's degree in computer science, Information Security, or a related field (or equivalent practical experience).
8+ years of cybersecurity experience, specializing in Security Operations and Incident Response.
Relevant industry certifications in Incident Response and Forensics related certificates areas, such as GIAC (GCIH, GCFA, GCFE), CISSP, or CEH is highly desirable.
Excellent communication skills, both written and verbal, with the ability to convey technical information clearly.
Expertise in incident handling, threat hunting, digital forensics, malware analysis, SOAR, operating systems, network security, purple teaming, and emerging security intelligence.
Skilled in using tools like CrowdStrike EDR, Breach & Attack Simulation platforms, NDR, Splunk Enterprise Security, and IDP/ITDR.
Comprehensive understanding of network protocols, Windows and Linux operating systems, and security architectures.
Capable of working independently or within a team in high-pressure environments.
Knowledgeable about the MITRE ATT&CK framework.
Process-oriented with strong analytical and decision-making skills.
Effective team player with excellent interpersonal abilities.
Familiarity with cloud security (AWS, Azure, GCP) is advantageous.
Envestnet:
Be a member of an innovative and industry leading financial technology and solutions company
Competitive Compensation/Total Reward Packages that include:
Health Benefits (Health/Dental/Vision)
Paid Time Off (PTO) & Volunteer Time Off (VTO)
401K - Company Match
Annual Bonus Incentives
Parental Stipend
Tuition Reimbursement
Student Debt Program
Charitable Match
Wellness Program
Envestnet is an Equal Opportunity Employer.
#LI-AQ1
Auto-ApplyAI Security Engineer
Cyber security analyst job in Philadelphia, PA
Job Description
Job Title: AI Security Engineer Duration: 6 Months to extend Rate : $100-120 Per Hour W2
Secure ML infrastructure and data pipelines
Conduct audits and implement anomaly detection
Monitor for adversarial inputs or AI misuse
Requirements:
5 years in cybersecurity or cloud security
Familiar with AI/ML threat modeling
Experience with IAM, SOC, and monitoring tools
Nice to Haves:
Certifications (e.g., CISSP, CISM, MLSP)
Background in red teaming AI systems
Security Analyst
Cyber security analyst job in Moorestown, NJ
Ventures Unlimited is a service centric organization. Our success begins with our ability to apply our relationships, leverage technologies, and identify talent - often in combination - to an endless array of real-world customer needs
Position : Security Analyst (SIEM)
Location: Moorestown, NJ
Duration: Full Time
Job Description :
Overall experience of 8+ years in the field of information security with 2+years of experience in handling Security Analytics/SIEM tools such as Arcsight, Loglogic, Splunk etc.
Working knowledge of
SQL and Oracle databases, Windows operating systems and Cisco and Juniper network solutions
Windows and UNIX administration experience
Perl or Python scripting knowledge
Familiar with Regular Expressions. Can create regular expressions to search for evidence of malicious activity
Able to interpret log files from various network devices to include firewall, proxy, endpoints and web servers
Ability to work independently and within a team environment
Demonstrated ability to stay current with information security best practices, existing and emerging technology
Good oral communications and written communication skills
Certifications such as CEH, ECSA, CISSP, GISP etc. are preferred
Thanks & Regards
Rahul Kumar
Additional Information
Contact
"Rahul Kumar
" for more details at
************ Ext :157
Technical Security Analyst
Cyber security analyst job in Philadelphia, PA
As a Technical Security Analyst here at Chubb, you'll leverage your broad information security expertise to play a crucial role in our Regional Information Security Office (RISO) for North America. Reporting to the Head of Technical Security. You'll collaborate with business, technical, and engineering stakeholders to identify and address security gaps, guide compliance corrections, and manage control exceptions throughout the development and infrastructure deployment lifecycle. You'll drive business process improvements using tools like Power Automate, contributing to strategic project deployments. You'll engage with stakeholders at all levels, playing a critical role in ensuring the security and stability of our applications and infrastructure. At Chubb, you won't be silo'd; you'll have broad exposure across all areas of information security, in a complex technical environment that powers Chubb's North American business operations.
To do so, you'll leverage your knowledge of, and gain additional exposure to,:
Application Security: Leverage your understanding of application security, including mastery of security principles, familiarity with the OWASP Top 10, and the ability to secure CI/CD pipelines
Vulnerability Management: You'll regularly interpret SAST/DAST/SCA/IAST/Infra vulnerability management tool results and provide advice to development, infrastructure, and business stakeholders
Network Security: Employ your knowledge of network security principles and best practices, analyze network connectivity for security, and understand the importance of DMZs and firewall technologies
Identity and Access Management: Use your knowledge of authentication methods and Privileged Access Management to ensure adherence to authentication standards
Data Security: Incorporate your knowledge of data classification and encryption to apply best practices to database technologies
Reporting and Automation: Utilize tools like Power Automate to automate business processes while gathering and presenting security metrics to business and technical stakeholders through the use of BI tools such as Qlik, PowerBI, Tableau, etc.
Bachelor's Degree from an accredited college or university in Information Security, Information Technology, Computer Science, or a related technical degree
At least 6 years' of experience working in an information security focused role spanning Application Security, Vulnerability Management, Identity and Access Management Network Security, Data Security and/or a related discipline
Proven ability to apply knowledge to proactively identify and resolve security concerns if/as they arise
Experience interpreting and applying information security standards and frameworks (e.g., ISO/IEC 27001/27002, PCI-DSS, NIST Cybersecurity Framework, etc.)
Demonstrated knowledge of securing cloud platforms and applications
Proven ability to explain technical issues to mixed audience ranging from technical to business, project management to leadership
Experience managing project lifecycles, with working experience of Agile, Waterfall and CI/CD project methodologies
Proven knowledge across varied technologies such as networking, servers, IOT etc.
Demonstrated ability to understand and analyze complex business processes and technologies to make sound recommendations to constituents
The pay range for the role is $118,100 to $200,000. The specific offer will depend on an applicant's skills and other factors. This role may also be eligible to participate in a discretionary annual incentive program. Chubb offers a comprehensive benefits package, more details on which can be found on our careers website. The disclosed pay range estimate may be adjusted for the applicable geographic differential for the location in which the position is filled.
Auto-Apply