Post Job

Cyber Security Analyst Jobs in Reading, OH

- 82 Jobs
All
Cyber Security Analyst
Cyber Security Engineer
Security Engineer
Information Systems Security Officer
Information Security Analyst
Senior Security Engineer
Security Architect
Senior Security Consultant
Security System Engineer
  • Azure Security Engineer

    Procter & Gamble 4.8company rating

    Cyber Security Analyst Job In Covington, KY

    Information Technology at Procter & Gamble is where business, innovation and technology integrate to build a competitive advantage for P&G. Our mission is clear -- we deliver IT to help P&G win with the over 5 billion consumers we serve worldwide. Our IT professionals are diverse business leaders who apply IT expertise to deliver innovative, tech-focused business models and capabilities for our 65 iconic, trusted brands. From Day 1, you'll be trusted to dive right in, take the lead, use your initiative, and build billion-dollar brands that help make everyday activities easier and make the world a better place! Our company offers purposeful work that will take your career places you never envisioned, in creative workspaces where innovation thrives and where your technical expertise is recognized and rewarded. The Opportunity We are seeking a Senior Cloud Security Engineer to lead cloud security initiatives with the goal of maturing security controls and working closely with data engineering teams to enhance P&G security posture. This is a highly visible role that requires regular interaction with senior management, product managers, business leads, and service providers, in addition to technical partners. We believe that data is a critical business asset that empowers strategic decision making, integrates into daily operational processes using ML/AI technologies and provides vital insights into product innovation, marketing, product supply, and R&D. In an era where data growth is outpacing the organization's ability to get value from it, the Data & Analytics (D&A) organization is at the heart of driving the required cultural change: enhance value of data in a responsible, secure way. Position Responsibilities Cloud Security: Serve as the cloud security SME for P&G's global D&A organization - including support of platform teams, data architects, data pipelines, data science, AI engineering, and operations teams. Advise engineering teams on technical options to implement security controls. Keep up to date on the latest PaaS and IaaS products/services, security features, and the implications of any changes to P&G's risk profile. Security and Privacy by Design: Lead initiative to embed security and privacy controls throughout the product lifecycle while enabling the growth of platforms, data pipelines, and capabilities. Develop toolkit for product and engineering teams that includes security features, guidelines, processes, control assessments, and metrics. Security Engineering and Automation: Implement automation and other technical solutions to streamline security and compliance processes. Review security technologies/tools and assess their potential for adoption Threat and Vulnerability Management: Proactively review threat intelligence and collaborate with Infosec partners to track and mitigate key threats to P&G infrastructure and systems. Lead vulnerability management program, including process for responding to alerts, remediating issues, and improving security controls. Training: Develop security training in collaboration with the enterprise security and cloud teams. Contribute to knowledgebase and other upskilling efforts. The Ideal Candidate Is passionate about cyber security and improving infrastructure for the future. Can work independently and as a team to gather requirements and translate into solutions. Is meticulous and analytical in nature, with strong problem-solving skills. Has the ability to multitask and prioritize, work on multiple projects and manage time effectively. Can produce and present technical information to both technical and non-technical personnel. Can provide customer-facing support in a professional manner. Job Qualifications Required: Bachelor's Degree in Information Systems, Information Technology (IT), Computer Science, Software Engineering, other STEM field 5+ years of hands-on Azure cloud security experience, with deep knowledge of PaaS and IaaS offerings and capabilities. Experience with Databricks, Azure Networking, Synapse, Azure Analysis Services, Azure Data Factory, Storage accounts, and VMs highly preferred. Strong PowerShell, Azure Log Analytics, and related scripting skills to support security analysis and automation efforts. 3+ years proven experience working with DevOps teams and CI/CD processes Strong background in security and data privacy frameworks such as ISO/IEC 27001, NIST, GDPR, and CCPA Ability to work cross functionally and influence stakeholders at all levels Can work in Cincinnati, OH office 3 days per week Preferred: Certifications: CISSP, CCSP and/or AZ-500 certifications are a strong plus Application development and scripting (SQL/Python) experience as part of large-scale programs Pay Range: $105k-$150k Compensation for roles at P&G varies depending on a wide array of equal opportunity factors including but not limited to the specific office location, role, degree/credentials, relevant skills, and level of experience. At P&G compensation decisions are dependent on the facts and circumstances of each case. Total rewards at P&G include salary + bonus (if applicable) + benefits. Your recruiter may be able to share more about our total rewards offerings and the specific salary range for the relevant location(s) during the hiring process. Our company is committed to providing equal opportunities in employment. We value diversity and do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status. Immigration Sponsorship is not available for this role. For more information regarding who is eligible for hire at P&G along with other work authorization FAQ's, please click HERE. P&G participates in e-verify as required by law. Qualified individuals will not be disadvantaged based on being unemployed. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. Job Schedule Full time Job Number R000108004 Job Segmentation Experienced Professionals (Job Segmentation) Starting Pay / Salary Range $105,000.00 - $150,000.00 / year
    $105k-150k yearly 33d ago
  • Information Systems Security Officer (ISSO) II

    General Dynamics Information Technology 4.7company rating

    Cyber Security Analyst Job In Dayton, OH

    Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Information Security Job Qualifications: Skills: Information Security, Information Security Management, Information System Security Certifications: None Experience: 2 + years of related experience US Citizenship Required: Yes Job Description: The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: Assist the ISSM in meeting their duties and responsibilities Prepare, review, and update authorization packages Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly Ensure all IS security-related documentation is current and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them Prepare reports on the status of security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries Experience: 2-5 years related experience SAP experience required Prior performance in roles such as System, Network Administrator, or ISSO Education: Bachelor's degree in a related area or equivalent experience (4 years) Certifications: IAT Level II or IAM Level II - within 6 months of hire (Security+ CE, CCNA Security, etc.) Security Clearance: TS/SCI required Must be able to Attain - TS/SCI with CI Polygraph Other Requirements: Must be able to regularly lift up to 50lbs #AirforceSAPOpportunities The likely salary range for this position is $82,110 - $111,090. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: 10-25% Telecommuting Options: Onsite Work Location: USA OH Dayton Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 30 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.We connect people with the most impactful client missions, creating an unparalleled work experience that allows them to see their impact every day. We create opportunities for our people to lead and learn simultaneously. From securing our nation's most sensitive systems, to enabling digital transformation and cloud adoption, our people are the ones who make change real.GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
    $82.1k-111.1k yearly 6d ago
  • Computer & Information Security Analyst 2

    Vets Hired

    Cyber Security Analyst Job In Cincinnati, OH

    Job Description This position will primarily be responsible for monitoring and analyzing security alerts using our Security Information and Event Management (SIEM) platform, conducting regular vulnerability assessments and configuration compliance scans, managing email security measures, and providing technical support for various cybersecurity tools as needed. Responsibilities Monitor and analyze security alerts using the SIEM system and other specialized monitoring tools. Triage and investigate potential cybersecurity incidents, prioritizing threats based on severity and potential impact on the system. Conduct a thorough investigation of security violations and incidents, collaborating with other team members and/or escalating to manager as necessary. Conduct regular vulnerability assessments and configuration compliance scans across internal and external networks. Collaborate with cross-functional IT teams on vulnerability remediation efforts and address configuration baseline deviations, ensuring timely resolution and improved security posture. Monitor and analyze email security systems, including user-reported phishing attempts. Perform appropriate investigation and remediation actions as necessary. Identify and develop ways to improve the efficiency of security, network, and application log monitoring. Provide technical and end-user support for cybersecurity tools as needed. Qualifications Bachelors degree in technology-related field and 2-4 years of job-related experience. An equivalent combination of education and experience requiring similar knowledge, skills, abilities, and performing duties as described may be substituted for the minimum requirements. Experience conducting vulnerability scanning and assessments using tools like Nessus Professional and Qualys. Familiarity with cybersecurity frameworks and standards, such as National Institute of Standards and Technology (NIST) SP 800-53, NIST SP 800-171, and NIST cybersecurity framework is preferred. Experience with configuration baselines such as Center for Internet Security (CIS) Benchmarks and Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGS) is preferred. Fundamental networking knowledge, such as TCP/IP and common protocols (HTTP, HTTPS, FTP, SSH, DNS, etc.). Fundamental understanding of firewalls, intrusion detection/prevention systems (IDS/IPS), data loss prevention (DLP), endpoint antivirus, and email security. Ability to read and interpret various system and security logs, such as Windows Event Logs, firewall logs, antivirus logs, email security/filtering logs, and IDS/IPS logs is required. Basic knowledge of SIEM systems such as LogRhythm, QRadar, Splunk, ELK stack, etc. Must have good verbal and written communication skills. Must be able to clearly document findings, incidents, and procedures. Must be able to pass a National Agency Check with Inquiries (NACI/Tier 1) background check.
    $70k-99k yearly est. 15d ago
  • Data Security Architect

    Tata Consultancy Services 4.3company rating

    Cyber Security Analyst Job In Cincinnati, OH

    Must Have Technical/Functional Skills Data Security, DLP, Microsoft Purview, Cyber security Experience Required 3+ Year of DLP operational experience is required, must have implemented DLP, understanding expressions, analysis, policy drivers, and rules work, etc. Roles & Responsibilities We are looking for a Cloud Solution Architect (CSA), specializing in Data Security DLP Architect who is passionate about driving our customers' security & AI transformation on the Microsoft Platform. This person will be a trusted advisor for customers attempting to secure their entire data estates against internal and external data risk. Microsoft Purview's integrated Data Security services support customers holistically securing data by: • Protecting Sensitive Data using data classification, sensitivity labelling and encryption policies. • Managing Insider Risks using machine learning detection controls and indicators, adaptive protection to dynamically enforce controls and advanced privacy controls • Preventing Data Loss using built in exfiltration policies for Microsoft 365 apps, services and endpoints. • Customer Satisfaction - Drive positive Customer Satisfaction & become a trusted advisor. • Customer/Partner Insights - Provide feedback & insights from customers/partners. • Be the Voice of Customer to share insights and best practices, connect with Global Security teams at Microsoft, Engineering and Product teams to remove blockers and influence the solution roadmap. • Support customers through the adoption lifecycle, through planning, adoption, deployment, and optimization. • Support increasing drive of Microsoft security products utilization. • Lead technical solutioning and nurturing across the customer journey. • Experience in the implementation (end to end) of Data Security projects with Data Security Platforms, preferably experience with Microsoft Purview (Information Protection, Data Loss Prevention, Information Risk Management) • Experience working with Microsoft 365 services and/or Azure data services such as SharePoint, Teams, Office 365, SQL, Azure Data Lake Services. OR equivalent experience. Generic Managerial Skills • Strong interpersonal skills, with an emphasis on the ability to effectively influence others and develop productive working relationships Salary Range: $110,000-$140,000 a year
    $110k-140k yearly 17d ago
  • Linux Cryptography and Security Engineer

    Canonical-Jobs

    Cyber Security Analyst Job In Cincinnati, OH

    Job Description This is a unique opportunity to use your software engineering and cryptography skills to build and maintain the security foundation that enables Ubuntu and its users to operate securely and remain compliant to international information security standards such as FIPS 140-3 and Common Criteria. You will use your applied cryptography, Linux Security, and coding skills to enhance the Ubuntu distribution and work with organizations such as DISA and CIS to draft and implement security hardening benchmarks for Ubuntu. As a member of the Security Hardening team you will work with and develop automation tooling to audit deployed systems for DISA-STIG and CIS benchmark compliance. You will interact with internal and external stakeholders to identify gaps in our frameworks, and develop new solutions to address these challenges. In this role you will have the opportunity to influence team and security culture, facilitate technical delivery, and help drive team direction and execution. You'll collaborate closely with Canonical's kernel team as well as the wider engineering organization to drive features impacting all Ubuntu users. Day-to-day responsibilities Collaborate with other engineers in the Security Hardening team to achieve and retain various Security certifications Extend and enhance Linux cryptographic components (OpenSSL, Libgcrypt, GnuTLS, and others) with the features and functionality required for FIPS and CC certification Collaborate with external security consultants to test and validate kernel and crypto module components Work with external partners to develop security hardening benchmarks and audit + remediation automation for Ubuntu Contribute to Ubuntu mainline and upstream projects to land solutions and benefit the community Communication and collaboration within and outside Canonical to identify opportunities to improve our security posture, rapidly resolve issues, and deliver high-quality solutions on schedule What we are looking for in you Hands-on experience with low-level Linux cryptography APIs and debugging Excellent software engineering fundamentals, including prior experience with C development, and the ability to demonstrate such Hands-on experience with Linux system administration and shell scripting Demonstrated knowledge of security and cryptography fundamentals + direct experience writing secure code and implementing best practices Significant development experience working with open source libraries Excellent verbal and written communications to enable efficient collaboration with internal and external partners in a remote-first environment Additional skills that you might also bring Prior experience working on FIPS/Common Criteria certified products and in-depth knowledge of the underlying standards Prior experience working directly with DISA-STIG or CIS benchmarks, including related audit + remediation tooling (e.g. Compliance as Code) Experience working directly with Linux Kernel Prior experience with Python, OVAL (Open Vulnerability Assessment Language), and Ansible History of contributions to open source projects What we offer you We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally. Distributed work environment with twice-yearly team sprints in person - we've been working remotely since 2004! Personal learning and development budget of USD 2,000 per year Annual compensation review Recognition rewards Annual holiday leave Maternity and paternity leave Employee Assistance Programme Opportunity to travel to new locations to meet colleagues from your team and others Priority Pass for travel and travel upgrades for long haul company events About Canonical Canonical is a pioneering tech firm that is at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Work at Canonical is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game. Canonical provides a unique window into the world of 21st-century digital business. Canonical is an equal opportunity employer We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration. #LI-Remote
    $74k-102k yearly est. 28d ago
  • Microsoft Senior Security Consultant

    Interlink Cloud Advisors, Inc.

    Cyber Security Analyst Job In Mason, OH

    Description: Interlink is looking for our next Microsoft Senior Security Consultant to join the team. We are a team of consultants who are passionate for information security and helping clients get value out of their technology investments. Reporting to the Security Practice Manager, you will be focused on implementing, managing, and maintaining Microsoft’s security solutions, including the Defender platforms, Azure Sentinel, Azure Information Protection, and more. Job Description: Provide consulting services to design and implement threat protection and response solutions based on the Microsoft Defender suite of products. Provide consulting services to design and implement Azure Sentinel as a SIEM Provide consulting services to design and implement data protection solutions based on Azure Information Protection Provide consulting services to design and implement identity and access management solutions based on Azure Active Directory Provide consulting services to integrate security solutions into an overall security and compliance posture to support Client business objectives and requirements Interface with Clients in a presales capacity to find opportunities and scope projects Provide third-level support to Clients Provide strong customer service while working with Clients onsite or remote Find opportunities to drive additional value to our clients while working with them Requirements: Skills/Requirements: 5+ years of prior consulting experience 5+ years of experience with Microsoft Defender (Endpoints, Office 365, Azure, Identity, etc…) or similar non-Microsoft products 5+ years of experience with Azure Sentinel or similar non-Microsoft products 5+ years of experience with Azure Active Directory or similar non-Microsoft products 5+ years of experience with Azure Information Protection or similar non-Microsoft products Familiarity with zero trust security principles Familiarity with common compliance frameworks including CMMC, NIST 800-171, FedRAMP, GDPR, and HIPAA Experience with penetration testing and/or vulnerability management tools is a plus, but not required Active industry certifications are helpful, though not required Our Benefits Medical, Dental, and Vision coverage Flexible schedules, 3 weeks of vacation time annually, 7 paid company holidays, and paid birthday off Voluntary supplemental insurances (life, disability, and accident) 401(k) with company contribution Awarded the 2023 Best Places to Work Winner in Cincinnati by the Business Courier About Us Interlink is a nationally recognized IT consulting company, offering the flexibility of a small company while providing stability and benefits usually found at enterprise firms. We work with a "family first" attitude, so we look to hire motivated individuals who understand that accomplishing our goals in supporting our clients while having fun is important. At Interlink, we also believe that working in an innovative, fun, and collaborative environment is key to success. As the winner of The Best Places to Work Award three years in a row, we know what it takes to care for our employees and clients. Get to know more about us and our company culture. Our Culture Promise At Interlink, we believe in creating a positive and collaborative work environment where everyone can thrive, grow, and make an impact. We value diversity, equity, innovation, and excellence in everything we do. Interlink is more than just a company; we are a community. You'll enter a supportive, collaborative work environment where everyone has your back. We celebrate your wins, encourage you during challenges (both personal and work), and foster connections beyond the office walls. We are looking for people who share our vision and passion for making a difference. If you are ready to join a team of talented and driven professionals who love what they do, you are in the right place. Interlink Cloud Advisors is an equal-opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran, or disability status. #Linkedin-Remote
    $92k-126k yearly est. 29d ago
  • Cyber Security Analyst Dayton, OH

    Broadway Ventures LLC 4.2company rating

    Cyber Security Analyst Job In Dayton, OH

    ****Cyber Security Analyst**** We are actively seeking applicants that have experience in one or more of the areas listed below to be part of an enterprise Cybersecurity organization. If you have interest in being part of a team providing leading edge cybersecurity services to a large part of the DoD community, then please reach out to us. ****Specific Job Description:**** * Analyze suspicious or malicious network traffic to identify unauthorized or anomalous activity * Conduct cybersecurity monitoring and analyzes threats and suspicious/malicious network traffic * Identify, documents, and reports unauthorized activity/attacks * Incorporate data from deployed sensors into malicious/suspicious traffic analysis capability and ensure the sensors remain fully operational * Develop and distribute countermeasures and interim guidance to prevent or mitigate threats and/or attacks * Monitor a platform capable of performing information security continuous monitoring (ISCM) for the purposes of detecting cyber intrusions, attacks, anomalous behavior, and possible insider threats ****Required Security Clearance:**** * Candidate MUST be able to obtain and maintain a TOP SECRET security clearance * Strongly preferred if you already have an active Secret or Top Secret clearance ****Minimum Requirements:**** * Current DoD 8570 Certification. * Candidate MUST have IAT Level II Security+ certification or higher and Certified Ethical Hacker (CEH) within 6 months. * Strong interpersonal and communication skills * Ability to work in a team and as individual contributor * Ability to manage multiple projects and tasks in a rapidly evolving environment ****Preferred Qualifications:**** * Scripting skills including python and/or bash **Work Location:** * Dayton, OH, reliably commute or planning to relocate before starting work **Job Type**: Full-time, 8 hour shifts **Benefits**: * 401(k) * Dental insurance * Health insurance * Life insurance * Paid time off * Paid holidays * Vision insurance **What to Expect Next:** After submitting your application, our recruiting team members will review your resume to ensure you meet the qualifications. This may include a brief telephone interview or email communication with a recruiter to verify resume specifics and salary requirements. Management will be conducting interviews with the most qualifies candidates. We perform a background and drug test prior to the start of every new hires' employment. Broadway Ventures is an equal opportunity employer and VEVRAA Federal Contractor.All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Education Select... Select... Select... If you believe you belong to any of the categories of protected veterans listed below, please indicate by making the appropriate selection. As a government contractor subject to the Vietnam Era Veterans Readjustment Assistance Act (VEVRAA), we request this information in order to measure the effectiveness of the outreach and positive recruitment efforts we undertake pursuant to VEVRAA. Classification of protected categories is as follows: A "disabled veteran" is one of the following: a veteran of the U.S. military, ground, naval or air service who is entitled to compensation (or who but for the receipt of military retired pay would be entitled to compensation) under laws administered by the Secretary of Veterans Affairs; or a person who was discharged or released from active duty because of a service-connected disability. A "recently separated veteran" means any veteran during the three-year period beginning on the date of such veteran's discharge or release from active duty in the U.S. military, ground, naval, or air service. An "active duty wartime or campaign badge veteran" means a veteran who served on active duty in the U.S. military, ground, naval or air service during a war, or in a campaign or expedition for which a campaign badge has been authorized under the laws administered by the Department of Defense. An "Armed forces service medal veteran" means a veteran who, while serving on active duty in the U.S. military, ground, naval or air service, participated in a United States military operation for which an Armed Forces service medal was awarded pursuant to Executive Order 12985.
    $72k-99k yearly est. 15d ago
  • Cyber Security Analyst - Entry Level

    Per Scholas-National Recruitment 3.6company rating

    Cyber Security Analyst Job In Cincinnati, OH

    Entry Level Cyber Security Analyst Cincinnati, OH READ BEFORE YOU APPLY! Opportunity: Per Scholas is helping to source entry-level candidates for Cyber Security Analyst positions with our employer partners in the Cincinnati region and will offer free training to candidates in need of additional upskilling in order to qualify. Requirements: To be successful, candidates need to possess basic literacy, math, critical thinking, and self-teaching skills, do well in fast-paced environments, and be able to learn new technologies quickly. What we are looking for: Must have at least a High School diploma or GED Must be authorized to work in the US Previous tech work experience or education preferred Must be able to commit a Monday - Friday, 9:00am - 4:00pm Must live in the Atlanta area We are not currently offering visa sponsorship or transfers, but we will accept applications from individuals with work authorization.
    $69k-93k yearly est. 60d+ ago
  • Information Security Specialist - Standards Coordinator

    Robert Half 4.5company rating

    Cyber Security Analyst Job In Cincinnati, OH

    Description We are in search of an Information Security Specialist - Standards Coordinator to join our team based in Cincinnati, Ohio. This role lies within the tech industry and will involve tasks related to the maintenance and improvement of our information security standards. The role offers a long-term contract employment opportunity. Responsibilities: - Manage and maintain information security standards and guidelines - Implement and coordinate security measures for information systems to regulate access to computer data files and prevent unauthorized modification, destruction, or disclosure of information - Perform regular audits to ensure security practices are compliant - Utilize skills in Checkpoint, Cisco ASA, Cisco Technologies, Cloud Technologies, and Firewall Technologies for effective security management - Use AB Testing, Auditing, AWS Technologies, and Configuration Management to ensure the robustness of security systems - Lead Cyber Security initiatives and strategies to enhance the security framework - Monitor and evaluate the efficiency of security operations and make necessary adjustments - Collaborate with different teams to ensure the implementation of security measures across all departments - Stay updated with the latest trends in information security and incorporate them into our security strategies Requirements - Proficient in Checkpoint, Cisco ASA, and Cisco Technologies. - Demonstrated expertise in Cloud Technologies and Firewall Technologies. - Proficiency in AB Testing and Auditing. - Strong knowledge of AWS Technologies and Configuration Management. - Proven experience in Cyber Security. - Bachelor's degree in Computer Science, Information Systems, or related field. - Minimum of 3 years of experience in information security or related field. - Strong problem-solving skills and ability to work under pressure. - Excellent written and verbal communication skills. - Ability to work both independently and in a team-oriented environment. - Relevant certifications in information security are preferred. - Willingness to stay updated with the latest advancements in technology and security threats. - Ability to handle confidential and sensitive information with discretion. - Strong analytical and organizational skills. Technology Doesn't Change the World, People Do. Robert Half is the world's first and largest specialized talent solutions firm that connects highly qualified job seekers to opportunities at great companies. We offer contract, temporary and permanent placement solutions for finance and accounting, technology, marketing and creative, legal, and administrative and customer support roles. Robert Half works to put you in the best position to succeed. We provide access to top jobs, competitive compensation and benefits, and free online training. Stay on top of every opportunity - whenever you choose - even on the go. Download the Robert Half app (https://www.roberthalf.com/us/en/mobile-app) and get 1-tap apply, notifications of AI-matched jobs, and much more. All applicants applying for U.S. job openings must be legally authorized to work in the United States. Benefits are available to contract/temporary professionals, including medical, vision, dental, and life and disability insurance. Hired contract/temporary professionals are also eligible to enroll in our company 401(k) plan. Visit roberthalf.gobenefits.net for more information. © 2024 Robert Half. An Equal Opportunity Employer. M/F/Disability/Veterans. By clicking "Apply Now," you're agreeing to Robert Half's Terms of Use (https://www.roberthalf.com/us/en/terms) .
    $80k-113k yearly est. 33d ago
  • Cyber Engineer I-III

    Humrro 4.0company rating

    Cyber Security Analyst Job In Alexandria, KY

    * Alexandria, VA, USA * Commensurate with Education and Experience * Full Time * *Excellent Benefits Package* Email Me This Job ****Cyber Engineer I-III**** The Human Resources Research Organization (HumRRO) is a non-profit leader in applied research, evaluation, and analytics in the arenas of employment, student, and military testing, and professional credentialing and licensing. We work with federal and state government agencies, private sector organizations, and professional associations. **About the Organization** As a non-profit, HumRRO is dedicated to work that contributes to science and society. Our employees enjoy a highly collaborative and supportive environment that fosters innovation, ethical practice, and outstanding customer service. Our core operational staff includes Behavioral Science and Educational Research professionals. We are committed to supporting a diverse workforce and to practicing equity and inclusion for all staff. **About the Job** About the Role: We are seeking a hands-on Junior to Mid-Level Cyber Engineer to join our dynamic team. This role is crucial in maintaining and enhancing our organization's cybersecurity posture. The ideal candidate will be involved in various aspects of our security operations, from conducting vulnerability assessments to analyzing security logs and artifacts. Your role will consist of performing NIST800-171 and 53(RMF) support for Federal and DoD and DOD Contractor IT systems by conducting risk assessments and developing RMF package components and test plans, assisting in documentation on cyber security technologies, best practices, policies and procedures. Other tasks include maintenance and technical reviews of IA security processes assuring requirements for continuous compliance activities, annual control assessments, monitoring POA&Ms, MFRs, and IA artifacts, creating and updating security documentation, and developing mitigations for maintaining compliance. The position is onsite at a HumRRO office in Alexandria, VA (Hybrid work setting and other offices in Minneapolis, MN; Louisville, KY, San Diego, CA; or Monterey, CA may be considered). U.S. citizenship is required for this position based on government contract requirements. **Key Responsibilities:** * Assist in performing penetration testing and vulnerability assessments using tools such as OWASP ZAP, Burp Suite, and Kali Linux * Conduct analysis of user access and behavior using analytics and security monitoring tools * Review and analyze scan results from tools like SonarQube/Fortify to identify security issues and propose remediation actions * Collaborate with development teams to address and remediate security findings * Review and investigate issues found in error and audit logs * Conduct monthly security reviews, capture and document necessary compliance evidence * Assist in maintaining HumRRO's NIST 800-171, ISO 27001:2022 and CMMC control evidence catalogs * Maintain SaaS compliance data and provide monthly reports on NIST 800-171, ISO 27001:2002 and CMMC compliance status * Assist in developing and maintaining compliance-related policies, processes and procedures * Assist in third-party NIST 800-171, ISO 27001:2002 and CMMC compliance audits * Stay current with the latest security threats, vulnerabilities, and industry best practices * Assist in maintaining compliance with relevant security standards and regulations such as NIST-800-171, NIST-800-53 (RMF for DoD), and CMMC **Required Qualifications:** * Bachelor's degree in Computer Science, Information Security, or related field (or equivalent work experience) * DOD clearance T/3 (public trust) eligible and US citizenship. * 1-3 years of experience in cybersecurity or related IT roles * Knowledge of secure coding practices and web application security * Familiarity with common security tools and technologies * Strong analytical and problem-solving skills * Knowledge of NIST frameworks and other security standards * Excellent communication and collaboration abilities * Willingness to learn and adapt to new technologies and methodologies **Desired Qualifications:** * Security+ or other relevant security certifications CCSP, CISSP, Security+ certification, * Experience with cloud DevSecOps (AWS, Azure, or GCP) * Familiarity with DevSecOps practices, DISA standards, enterprise level work with security policies, network administration and support within AWS GovCloud. * In depth operational knowledge of IA controls and secure configurations with proficiency using ACAS, HBSS, and IAVM reporting. * Analyzing system configuration per DISA STIG using STIGviewer and SCAP to mitigate security vulnerabilities. * Exceptional skills responding to IAVAs as necessary to address systems vulnerabilities and remediating findings in FISMA and DIACAP audit reports. * Review proposed new systems, networks, and software designs and concepts for potential security risks, recommend mitigations or countermeasures and resolve integration issues. * Proficient with eMASS package development. * Detailed knowledge of Federal and DoD directives including RMF and DIACAP and ensuring these security policies, standards, and procedures are enforced. * Strong knowledge of RMF/NIST and Assessment Authorization processes. **What We Offer:** * Opportunity to work on challenging projects and make a significant impact on our organization's security * Collaborative environment with experienced security professionals and software engineers * Continuous learning and professional development opportunities * Competitive salary and benefits package If you are passionate about cybersecurity and ready to take your career to the next level, we encourage you to apply. Join us in our mission to build and maintain a secure application landscape! All qualified applications will receive consideration without regard to race, color, religion, sex, national origin, age, marital status, sexual orientation, gender identity, veteran status, medical condition, or disability. EEO/AA Employer/Vet/Disabled. Named one of "50 Great Places to Work" by Washingtonian magazine, 2019, and one of the "Top Workplaces" by The Washington Post for 2020 and 2021. You must select a location. You must select an education status answer. You must select a seeking status answer.
    $79k-102k yearly est. 8d ago
  • Cyber Security Engineer

    UIC Government Services and The Bowhead Family of Companies

    Cyber Security Analyst Job In Dayton, OH

    CYBER SECURITY ENGINEER (HITS-R): Bowhead seeks a Cyber Security Engineer to support the High Performance Computing Modernization Program (HPCMP) Integrated Technical Services -Restricted (HITS-R) contract located in Dayton, OH. Bowhead will provide the High Performance Computing Modernization Program (HPCMP) with technical and professional support elements required for the operation of the HPCMP Office (HPCMPO) in all phases of planning and execution of its mission, including: technical and administrative support in all areas of program activity, program management support, meeting facilities and office environment, to include a complete telecommunications and computer systems capability and full logistical services. The Cybersecurity Engineer will provide systems engineering expertise in the design, integration, operation, and maintenance of cybersecurity infrastructure and capabilities. They will define and employ documented procedures for sustainable, continued operations of enterprise Computer Network Defense capabilities, including centralized vulnerability/patch management processes for all systems. These highly skilled individuals will work in various capacities alongside Computer Network Defense (CND) Incident Responders and Warning Intelligence Analysts. The Cybersecurity Engineers will maintain the establishment of infrastructure services supporting cybersecurity environments such as directory services in support of authentication, networking monitoring services, domain name services, virtual hosting infrastructure, etc. They will support the functionality of an environment designed to foster cybersecurity research, development, and operations. **Responsibilities** - Develop interface specifications for use within the enclave environments. - Ensure that enclave systems and network designs support the incorporation of DoD-directed vulnerability solutions, e.g. IAVA requirements. - Apply and maintain cybersecurity for systems; - Utilize defense-in-depth strategies and methods to harden systems and networks (e.g. blocking/filtering, IDS/IPS, A/V, logical separation of management traffic, content detonation and automated analysis, and DISA SRG/STIG compliance) - Responsible for interfacing with both cybersecurity operations and project personnel in order to formulate engineering requirements, and seek concurrence in satisfying stated objectives - Maintain a schedule for upcoming software and hardware upgrades and follow procedures for regularly scheduled maintenance and, in the instances necessary, ad hoc or emergency maintenance - Ensure secure backup of systems and data through formally documented backup plan, accurate and up-to-date listing of systems to be backed up, proper storing and labeling of completed backups - Possess the necessary technical skills to lead the overall design, engineering, integration, operation and maintenance of a defense-in-depth strategy for cybersecurity infrastructure **Qualifications** - Must possess BS/A degree in Computer Science or related field. - Must have a CompTIA Security+ CE certificate (IAT Level II) and a Certified Ethical Hacker (CND-IS) certificate prior to starting. - A minimum of five (5) years of Linux and Networking experience, three (3) years' experience with IDS, IPS and Host Based Security Solutions is required. - Possess the necessary technical skills to lead the overall design, engineering, integration, operation and maintenance of a defense-in-depth strategy for cybersecurity infrastructure. - Intermediate to advanced level skills in Microsoft Office software suite - Word, Excel, Outlook, PowerPoint. - Ability to communicate effectively, interpret regulatory guidance and identified vulnerabilities to a wide audience. - Presentation and strong public speaking skills are required. - Strong interpersonal skills and good judgment with the ability to work alone or as part of a team. Physical Demands: - Must be able to lift up to 25 pounds - Must be able to stand and walk for prolonged amounts of time - Must be able to twist, bend, and squat periodically SECURITY CLEARANCE REQUIREMENTS: Must currently hold a security clearance at the Top Secret level, may be required to obtain a Top Secret/SCI clearance upon hire. US Citizenship is a requirement for Top Secret clearance at this location. \#LI-KC1 Applicants may be subject to a pre-employment drug & alcohol screening and/or random drug screen, and must follow UIC's Non-DOT Drug & Alcohol Testing Program requirements. If the position requires, an applicant must pass a pre-employment criminal background history check. All post-secondary education listed on the applicant's resume/application may be subject to verification. Where driving may be required or where a rental car must be obtained for business travel purposes, applicants must have a valid driver license for this position and will be subject to verification. In addition, the applicant must pass an in-house, online, driving course to be authorized to drive for company purposes. UIC is an equal opportunity employer. We evaluate qualified applicants without regard to race, age, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other protected characteristics EOE/AA/M/F/D/V. In furtherance, pursuant to The Alaska Native Claims Settlement Act 43 U.S.C. Sec. 1601 et seq., and federal contractual requirements, UIC and its subsidiaries may legally grant certain preference in employment opportunities to UIC Shareholders and their Descendants, based on the provisions contained within The Alaska Native Claims Settlement Act. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities. Please view Equal Employment Opportunity Posters provided by OFCCPhere (******************************************* . All candidates must apply online at ****************** and submit a completed application for all positions they wish to be considered. Once the employment application has been completed and submitted, any changes to the application after submission may not be reviewed. Please contact a UIC HR Recruiter if you have made a significant change to your application. In accordance with the Americans with Disabilities Act of 1990 (ADA), persons unable to complete an online application should contact UIC Human Resources for assistance (******************************************** The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c) UIC Government Services (UICGS / Bowhead) provides innovative business solutions to federal and commercial customers in the areas of engineering, maintenance services, information technology, program support, logistics/base support, and procurement. Collectively, the fast-growing Bowhead Family of Companies offers a breadth of services which are performed with a focus on quality results. Headquartered in Springfield, VA, we are a fast-growing, multi-million-dollar company recognized as a top Alaska Native Corporation providing services across the Department of Defense and many federal agencies. Bowhead offers competitive benefits including medical, dental, vision, life insurance, accidental death and dismemberment, short/long-term disability, and 401(k) retirement plans as well as a paid time off programs for eligible full-time employees. Eligible part-time employees are able to participate in the 401(k) retirement plans and state or contract required paid time off programs. **Join our Talent Community!** Join our Talent Community (************************************************************************ to receive updates on new opportunities and future events. **ID** _2024-21725_ **Category** _Engineering_ **Location : Location** _US-OH-Dayton_ **Clearance Level Must Be Able to Obtain** _Top Secret_ **Minimum Clearance Required** _Top Secret_ **Travel Requirement** _N/A_
    $68k-93k yearly est. 49d ago
  • TS/SCI Cyber Reverse Engineer

    Insight Global

    Cyber Security Analyst Job In Dayton, OH

    An employer in Dayton, OH is seeking a TS/SCI Cyber Reverse Engineer for a contract to hire opportunity. This individual will be responsible but not limited to the following: join a team of 5-6 in fast paced agile environment to not only develop software but to take the software and run it through reverse engineering tools to decompose an application to understand more information about it. This will be supporting a system that makes a difference to develop software and systems from vision to production. Will work directly with clients and sit on site 5 days a week at the base. Must have an active TS/SCI Security DoD clearance. We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ******************** . To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: *************************************************** . Skills and Requirements Active TSSCI Security DoD clearance Bachelor's Degree (STEM preferred) 3+ years of experience with C+3+ years of experience with performing reverse engineering and vulnerability analysis of software binaries using IDA Pro, Ghidra or Binary Ninja Experience with programming, including Python, C, or Assembly Experience with working in Windows or Linux environments Experience working with Debuggers (Immunity, GDB, Olly Dbg) Experience with working in a virtualized environment null We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal employment opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment without regard to race, color, ethnicity, religion,sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military oruniformed service member status, or any other status or characteristic protected by applicable laws, regulations, andordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request to ********************.
    $68k-93k yearly est. 60d+ ago
  • Cyber Security Engineer I

    RPS Defense 4.3company rating

    Cyber Security Analyst Job In Fairborn, OH

    Job Details Dayton, OH - Fairborn, OH Full Time 4 Year Degree Negligible Information TechnologyDescription Cyber Security Engineer I Level: Experienced Department: Intelligence Services Job Type: Full-time Job Summary The Cyber Engineer I supports the research, development, and sustainment of old and new hardware systems and software capabilities for intelligence production. Duties and Responsibilities Plan, conduct, and accomplish assessments of systems and networks within the networking environment. Identify systems/networks deviations from acceptable configurations, enclave policy, or local policy. Conduct passive evaluations (compliance audits) and active evaluations (vulnerability assessments). Establish strict program control processes to ensure mitigation of risks and support obtaining certification and accreditation of systems. Provide process support, analysis support, coordination support, security certification test support, security documentation support, investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits. Assist in the implementation of the required Government policy (i.e., NISPOM, DCID 6/3), and make recommendations on process tailoring. Support the formal Security Test and Evaluation required by each Government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports. Periodically conduct of a review of each system's audits and monitors corrective actions until all actions are closed. Qualifications Required Qualifications Bachelors Degree cyber security, computer science, engineering, or information technology. At least three years of experience working a cyber security role in the DoD space. Must have an active TS/SCI clearance. Proven experience in cyber security planning, assessment, and analysis Proven experience performing and reviewing technical security assessments Proficiency with Microsoft Office Suite, especially Excel and PowerPoint. Experience implementing risk management processes, specifically related to cyber security Working knowledge of the DoD Information Assurance Vulnerability Management Process. Meets Department of Defense Cyber Security Workforce (CSWF) requirements for Information Assurance Management (IAM) Level I Experience in planning, organizing, completing and presenting assessments of National Security/IA-related concepts, analyses, studies and procedures. Thorough understanding of DoD Computer Network Defense policy and requirements, and have cursory familiarity with CND tools and processes (e.g. network scanners; vulnerability mitigation; remediation; risk management). Working understanding of secure software development and assessment. Must be U.S. Citizen. AA/EOE M/F/Disabled/Vet This company is an affirmative action/equal opportunity employer and makes employment decisions without regard to race, color, religion, sex, national origin, age, disability or protected veteran status. All qualified applicants will receive consideration for employment.
    $75k-101k yearly est. 60d+ ago
  • Cyber Security Engineer

    Applied Research Solutions 3.4company rating

    Cyber Security Analyst Job In Dayton, OH

    Applied Research Solutions is seeking a full-time Cyber Security Engineer, located at Wright-Patterson AFB, OH support the ISR Crosscutter program. **Why Work with us?** Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support. Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers. **Responsibilities Include:** + The Contractor shall provide expert weapons system cybersecurity guidance and recommendations to program engineers, program managers, acquisition security program executive officer, Milestone Decision Authority (MDA), and AO. + The Contractor shall have current and demonstrated background related to supply chain risk management to prevent an adversary subverting weapon systems and critical networks. + The Contractor shall translate and provide comprehensive NIST 800-53 requirements to ensure SSE and procurement solutions are incorporated into an integrated program protection scheme based upon known or anticipated risks. Knowledge of systems engineering principles, network architecture analysis, verification and validation of requirements, and understanding the risk management process and understanding of the operational context of weapon systems employment is critical. + The Contractor shall provide subject matter expertise to support the AFPEO's intent to execute RMF to support assessment & authorization of assigned systems including generating required artifacts such as Interim Authority to Test (IATT), Authority to Connect (ATC), and Authority to Operate (ATO) packages as well as associated reports and presentations. + The Contractor shall have verifiable experience with Authorization Officials (AOs), their associated action officers and their processes, preferably for platform systems. + The Contractor shall execute risk reduction based policies and procedures, and develop system specific comprehensive cybersecurity processes to include implementation of continuous monitoring. + The Contractor shall document system architectures, utilizing original equipment manufacturer documentation and system interface specifications, to support the cyber analysis, identification, selection, and tailoring of security and privacy controls necessary to protect the system. + The Contractor shall provide expert level evaluation of designs and proposed implementation solutions to defend weapon systems and critical networks against malicious and non-malicious exploitation throughout the full acquisition lifecycle of portfolio programs. The Contractor shall evaluate threat data and develop residual risk recommendations and mitigations to senior DoD and AF leadership based on identification and analysis of weapons vulnerabilities. + The Contractor shall review and analyze interoperability requirements and shall review, develop and evaluate resultant specifications and internal and external Interface Control Documents (ICDs). + The Contractor shall review and propose technical recommendations at both the strategic and operational levels regarding critical technologies requiring protection, Program Protection Plans (PPP), and anti-tamper (AT) plans, cyber findings, vulnerabilities, and risks. + The Contractor shall conduct technical evaluations on vendors' proposals to ensure that cybersecurity requirements are properly addressed. + The Contractor shall assist and advise various working groups, planning teams and IPTs by preparing and reviewing agendas, coordinating topics and speakers, and researching, tracking and closing action items. + The Contractor shall support multiple systems security working groups to develop a secure, resilient aircraft based on SSE principles. + The Contractor shall provide expert identification, documentation, and assessment of threats, cyber findings, vulnerabilities, attack scenarios, impacts if exploited, and likely timelines for exploitation. + The Contractor shall provide stakeholders with on-time deliverables, RMF artifacts, cyber impact assessments, and approaches to meet growing ISR & SOF requirements. + The Contractor shall deliver solutions which are ready for the AO approval under significantly reduced timelines required by special operations and quick reaction capability programs. + The Contractor shall ensure that contractual documentation, such as statements of work, CDRLs, and SRDs, incorporate cybersecurity requirements that support the development of the assessment and authorization process. + The Contractor shall be able to support up to 33% of contract time on travel to support remote site, site visits, site audits, design reviews and engineering implementation reviews of network architectures. + Other duties as assigned **Qualifications/Technical Experience Required:** + Must be a US Citizen + Top Secret clearance required + The Contractor must have demonstrated expert level DoD acquisition processes experience related to acquisition platform and sensor cybersecurity engineering along with an expert understanding of Risk Management Framework (RMF), Cybersecurity strategies, developing cyber resilient systems of systems (SoS), systems engineering, network engineering, and technical interface design to ensure weapon systems meet cyber resilient and Systems Security Engineering (SSE) criteria. + Senior level cybersecurity positions will require IAT level 3 and/or level 2 certifications. be DoD 8570 certified and have a current T-5 special sensitive eligibility on the first day of the task order. + The DoD directive 8570 Information Assurance Technical Level 3 (IAT III) or Information Assurance Management Level 3 (IAM III) certification must be achieved within one year of the task order start date; and maintained throughout the period of performance. **Senior** **:** Possesses the advanced knowledge, experience and recognized ability to be considered an expert in their technical/professional field, possess the ability to perform tasks and oversee the efforts of junior and journeyman personnel within the technical/professional discipline. Will demonstrate advanced knowledge of their technical/professional discipline as well as possess a comprehensive understanding and ability to apply associated standards, procedures and practices in their area of expertise. (Program Office, Enterprise and Staff Level Support interface) Functionally Aligned Minimum Recommended Education and Experience: + Advanced Degree (Master of Arts (MA) / Master of Science (MS)) and 12 years of experience in the respective technical / professional discipline being performed, five years of which must be in the DoD + OR, BA/BS degree and 15 years of experience in the respective technical/professional discipline being performed, five of which must be in the DoD + OR, 20 years of directly related experience with proper certifications as described in the Functionally Aligned Job Descriptions, eight of which must be in the DOD. All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals based on disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
    $74k-99k yearly est. 11d ago
  • Cyber Engineer

    Cryptic Vector

    Cyber Security Analyst Job In Beckett Ridge, OH

    At Cryptic Vector, we are dedicated to mission success. We take the time to understand our customers' needs, delivering products that perform when our nation needs them most. We understand that properly supporting the most unique missions of the United States government requires the nation's best. Our focus is on creating a culture where the best and brightest want to grow, learn, and stay. If coming up with out-of-the-box solutions is your specialty, then you'll feel right at home at Cryptic Vector. We are solving the country's most unique problems in an environment where problem solvers and hard workers thrive. We've replaced corporate red tape with transparency and servant leadership. Honestly, it's hard not to love this culture! We value the individual experiences that our team members add to our culture and capabilities. Please don't hesitate to apply even if you don't meet the exact qualifications! We are interested in varying levels of experience. Cryptic Vector is looking for Cyber Engineers with experience or interest in offensive cyber engineering. Cyber Engineering at Cryptic Vector is a research and development position spanning a variety of disciplines. The responsibilities of the Cyber Engineer position may include the following: Reverse Engineering (RE) of software/firmware, Vulnerability Research (VR), exploit development/productization Design/develop post-exploitation effects in software/firmware, which can withstand scrutiny and attack Design/develop secure, reliable, software-based communication solutions Design/develop stealth solutions Collaborate with engineering teams and product end users to translate customer/business/technical requirements into architectural designs and software solutions Write unit tests, functional tests, and end-to-end tests Provide constructive code reviews for colleagues Programming languages: Direct and recent experience coding in C and/or C++ Interest in new systems programming languages Proficiency in modern scripting languages (like Python) is important but not central An ideal candidate for these positions will have: Experience developing user-mode applications for traditional platforms (Windows, Linux, mac OS, Android, iOS) or user/kernel-mode capabilities for non-traditional platforms (embedded/proprietary/custom firmware or operating systems) A hacker mindset. Interest analyzing software/firmware for weaknesses. Participation or interest in Capture the Flag (CTF)/hacking competitions Interest in the architecture/internals of proprietary operating systems Comfort working with assembly, machine code, hexadecimal, and binary. Familiarity with reverse engineering tools, such as IDA Pro and/or Ghidra. Experience using, analyzing, and manipulating old/new network protocols. Interest in network/socket programming using TCP/UDP. Working knowledge of basic cryptography functions and programming Humble confidence, with a desire to work in a team setting (perhaps using an agile methodology) Familiarity with software engineering methods/process. Familiarity with CI/CD pipelines and best practices. Requirements Preference for B.S. degree in Computer Science, Cyber Operations, Computer Engineering, Electrical Engineering, or related field Ability to obtain/maintain a US security clearance Willing to work in the greater Cincinnati area
    $68k-93k yearly est. 60d+ ago
  • Information System Security Officer III

    Grs, Inc. 4.4company rating

    Cyber Security Analyst Job In Wright-Patterson Air Force Base, OH

    Global Resource Solutions, Inc. (GRS) is seeking an enthusiastic, motivated, detail orientated, and talented individual for the position of Information System Security Officer III. Job Descriptio n: Summary: The ISSO III's primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Essential Duties & Responsibilities: Review, prepare, and update AIS authorization packages Notify customer when changes occur that might affect AIS authorization Perform AIS self-inspections, provide security coordination and review of all system test plans Identify AIS vulnerabilities and implement countermeasures Represent the customer on various technical review and inspection teams Conduct security surveys at subordinate facilities and gather pertinent security documentation for inclusion into system authorization packages Coordinate, prepare, and track AIS inspections, reports, and responses Maintain AIS security records and prepare Co-Utilization Agreements for network nodes operating in government facilities Prepare reports on the status of security safeguards applied to computer systems Ensure AIS and network nodes are operated, maintained, and disposed of in accordance with security policies and practices Perform ISSO duties in support of in-house and external customers Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts Review, track, and conduct AIS training Provide leadership, mentoring, and quality assurance for Team Members Requirement: Five (5) to Seven (7) years related experience Bachelor's Degree in a related area or equivalent experience (Four (4) years) Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 within 6 months of the date of hire. Security Requirements: Current Top Secret Clearance with SCI Eligibility Eligibility for access to Special Access Programs Willingness to submit to a Counterintelligence Polygraph Skills: Ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners Working knowledge of Microsoft Office (Word, PowerPoint, and Excel) Possess a high degree of originality, creativity, initiative requiring minimal supervision Must be familiar with security policy/manuals and the appropriate DCIDs/JAFANs and other guiding policy documents Requires travel within the organizational geographic Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation) Must be able to lift up to 50lbs Physical Requirements : This position requires employees to be willing and able to: sit, bend, reach, stoop, squat, stand, and walk. Communication: Excellent customer service via phone and face to face conversation, excellent written and oral command of English. An exciting and rewarding career awaits you with Global Resource Solutions, Inc. (GRS). GRS is a management consulting company to government and business that offers great career opportunities and a comprehensive slate of employee benefits to our employees including medical, dental, vision, short/long term disability, life insurance and a retirement plan. GRS is an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected veteran status. This employer participates in E-Verify and will provide the federal government with your Form I-9 information to confirm that you are authorized to work in the U.S. for more information please see the flyer: *******************************************************************************************
    $69k-88k yearly est. 14d ago
  • Information Security Analyst

    McGohan Brabender, Inc. 4.1company rating

    Cyber Security Analyst Job In Dayton, OH

    ** Information Security Analyst-Hybrid** **Job Details** Dayton Office - Dayton, OH **Description** **McGohan Brabender** ** Information Security Analyst McGohan Brabender is renowned for recruiting top-tier talent within the employee benefits industry. As one of the nation's largest employee-owned (ESOP) benefit firms, we are true entrepreneurial disruptors in the field. Our team embodies agility, serving as advisors, financial strategists, and innovative problem solvers. Our culture is infectious, grounded in our unwavering commitment to fostering a diverse and inclusive workplace where every individual is accorded the utmost dignity and respect. At the core of all our values, whether in life or business, lies our dedication to people. We wholeheartedly encourage everyone to bring their authentic selves to work every single day. **About the Role:** As an Information Security Analyst at McGohan Brabender, you will play an integral role in safeguarding our organization's data, systems, and networks from cyber threats. The ideal candidate will be a proactive and detail-oriented individual, focused on collaboration with other IT and non-IT resources to create the best solutions for the organization. **Key Responsibilities:** • Monitor network traffic, system logs, and security alerts for suspicious activity. • Analyze security incidents to assess impact and identify root causes. • Respond to security breaches, implement corrective actions, and mitigate threats. • Coordinate with IT to resolve vulnerabilities and recover affected systems. • Perform vulnerability assessments and risk analyses to identify security risks. • Recommend measures to mitigate identified risks. • Ensure security protocols align with industry regulations and best practices. • Conduct regular security audits for compliance with regulatory requirements. • Assist in designing, implementing, and managing security measures. • Collaborate with IT teams to deploy updates, patches, and configurations. • Provide security awareness training and develop best practice guidelines. • Collaborate with various departments to align security strategies with organizational goals. • Communicate security findings and recommendations to senior management. • Stay current with cyber threats and participate in continuous learning. **Qualifications:** * Knowledge of common information security management frameworks. * Experience implementing SOC2. * Understanding & experience implementing security protocols in a Microsoft client and server systems. * Security & configuration knowledge of O365, Azure, Exchange, Active Directory and related tools. * Experience with computer network penetration testing and techniques required. * Experience with proactive network, systems monitoring and threat management. * Three or more years of related experience. **Preferred Qualifications:** * Previously worked in a HIPAA environment. * Scripting language knowledge. * Process Automation experience (automating security related functions, scans, reports, etc.) * Linux knowledge. * Security certifications: CISSP, CISA, Security+ or similar.
    $64k-91k yearly est. 2d ago
  • Information Systems Security Officer (ISSO)

    Deftec

    Cyber Security Analyst Job In Wright-Patterson Air Force Base, OH

    Wright-Patterson AFB, OH, USA | Salary | Full Time Information Systems Security Officer (ISSO) DEFTEC delivers mission-critical solutions through skillfully delivered services and innovative products. We are inspired by our clients' critical missions and driven to provide the most effective solutions to execute their missions, operational challenges, and requirements. Our dedicated, experienced, and talented employees work closely with our clients to ensure the delivery of exceptional services and products. POSITION OVERVIEW DEFTEC Corporation seeks an Information Systems Security Officer to support our Air Force Research Laboratory Integration & Operations (AFRL/RS) Directorate customer JOB RESPONSIBILITIES: + Plan, implement, upgrade, and monitor security measures for the protection of computer networks and information + Assess system vulnerabilities for security risks and purpose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure + Respond to computer security breaches and viruses. + Administer, test, and implement computer databases, applying knowledge of database management systems + Coordinate changes to computer databases + Identify, investigate, and resolve database performance, capacity, and scalability issues. + Plan, coordinate, and implement security measures to safeguard computer databases. QUALIFICATIONS: Required Qualifications: + 5+ years of cybersecurity-related experience, including risk mitigation + 8570 compliant certification at IAT II or higher + Bachelor's degree or a master's degree and 4+ years of experience + Excellent verbal and written communication skills + Ability to obtain a Top Secret/SCI clearance Preferred Qualifications: + Prior experience supporting AFRL/RS DEFTEC offers a comprehensive whole life benefits package that includes medical, dental, vision, holiday, paid time off, life insurance, short/long term disability, and educational reimbursement. DEFTEC also matches 401k contributions dollar for dollar up to 3% of employee's income and an additional $0.50 for every dollar between 4-5% of employee's income. The DEFTEC team is comprised of professionals who make a difference every day in crucial missions related to national security. Our leadership knows that this happens by employing a diverse team who is well taken care of. Our employees are our top priority making DEFTEC an ideal place to work. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Please contact ************* if you require reasonable accommodations. DEFTEC is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP and alcohol when criteria is met as outlined in our policies. AAP/EEO Statement DEFTEC Corp is an Equal Opportunity and Affirmative Action Employer and prohibits discrimination and harassment of any type on the basis of actual or perceived race, color, national origin, ancestry, sex (including pregnancy, childbirth, breastfeeding and medical conditions related to pregnancy, childbirth or breastfeeding), gender, gender identity, and gender expression, religious creed, disability (mental and physical) including HIV and AIDS, medical condition (cancer and genetic characteristics ), genetic information, age, marital status, civil union status, sexual orientation, military and veteran status, denial of family and medical care leave, arrest record and/or any other characteristic(s) protected by federal, state or local law. This policy applies to all terms of employment including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, training, compensation, benefits, employee activities and general treatment during employment. Other Duties Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.
    $65k-87k yearly est. 11d ago
  • Cyber Security Engineer - Information System Security Officer

    Illumination Works LLC 3.9company rating

    Cyber Security Analyst Job In Beavercreek, OH

    Share If you are unable to complete this application due to a disability, contact this employer to ask for an accommodation or an alternative application process. **Cyber Security Engineer - Information System Security Officer** 27 days ago Requisition ID: 1132 **Location and Travel Details:** Dayton, OH - hybrid The key responsibilities of the **Cyber Security Engineer -** **Information System Security Officer (ISSO)** include: * Provide support for implementing and enforcing information systems security policies, standards, and methodologies * Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types of information * Analyze threats and develop and implement best practice methodologies for incident detection, reporting, and vulnerability remediation * Maintain records on systems, applications, hardware, etc. to include system upgrades * Evaluate security solutions to ensure they meet security requirements for processing information * Maintain operational security posture for information systems * Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system/program/enclave * Develop and maintain documentation for Certification & Accreditation in accordance with specified policies * Develop and update system security plans and other IA documentation * Provide CM for security-relevant information system software, hardware, and firmware * Develop system security policy and ensure compliance **Key skills for this position include:** * Demonstrated knowledge of and experience with several of the following: current security tools; hardware/software security implementation; communication protocols; encryption techniques/tools * Experience completing security evaluations of software systems or architectures to ensure they meet security requirements * Experience preparing and maintaining SSPs and other security related documentation * Experience proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies, preferably on a large software or IT program * Demonstrated experience performing day-to-day security operations of large, complicated information and information processing systems * Must be committed to developing and adhering to best practices * Must be a solutions-oriented team player and must possess a high level of self-initiative * Must have excellent interpersonal skills * Must possess a Security+ certification * Minimum education: Bachelor's degree in Computer Science, Cybersecurity, or comparable academic discipline * Minimum experience requirements: five years of experience required * Must have or be willing to obtain Secret Clearance (this requires US Citizenship) * Acceptable candidates must successfully pass a drug test and background screen **Desired Experience:** * Knowledge of DoD security requirements * Experience with Cloud * Knowledge of DoD systems, data and processes At Illumination Works, we know data, and we should, we've been doing it since we started in 2006! We specialize in everything data from big data to data science, software engineering, data management, AR/IoT, and cloud development. Illumination Works is a trusted technology partner in user-centered digital transformation-delivering impactful business results to clients. We partner with customers to solve their unique technology and data challenges, and stay on top of modern technologies and advancements leveraging our Innovation Lab. We invest in our employees in all aspects of their life and we value family. We offer market competitive salary, a generous PTO package, and comprehensive medical, dental, vision and life insurance plans. We also offer 401K, short/long-term disability insurance, a fun and engaging culture, and training opportunities to keep you up to speed on the latest technologies. Illumination Works is committed to hiring and retaining a diverse workforce. We are an Equal Opportunity Employer, making decisions without regard to race, color, religion, sexual orientation, gender identity or national origin, age, veteran status, disability, or any other protected class. Acceptable candidates must successfully pass a drug test and background screen.
    $66k-83k yearly est. 5d ago
  • Systems Engineer - Cyber & Security

    Existx, Inc.

    Cyber Security Analyst Job In Dayton, OH

    ExistX was founded to bridge the technology transition 'valley of death'-the critical gap between groundbreaking research and real-world, user-friendly solutions. Our team excels in applied engineering, transforming cutting-edge advancements in cryptography, cyber-physical systems, and automated reasoning into practical tools for both government and commercial applications. We leverage a unique suite of capabilities-incubated through our sister R&D firm, Galois, and key research partnerships-to rapidly prototype and deliver impactful solutions. Because of this, at ExistX, you're never starting at zero. You're launching from a foundation of breakthrough innovation. ∃X.P(X): For every problem (X), a solution exists (P). The solution exists. Let's build it together. The Role ExistX is seeking a dynamic, skilled Cyber Systems Engineer that has an interest and prior experience in cyber systems engineering and/or systems security to join our team in Dayton, Ohio. In this role, you will be a member of a multi-person team, serving as the focal point for an assigned project where you will lead the coordination and support activities that enable the government to go through the appropriate security accreditation processes. You are key to ensuring the customer achieves Authority to Operate (ATO), for both the unique cryptographic devices and the chassis that they are embedded in on the aircraft. You will work in a collaborative environment, interfacing with government personnel and contractor developer, integration, and test teams to bring secure encrypted communications to aircraft over multiple commercial satellite constellations. Work is performed at both the government and contractor facilities, as well as remote. Responsibilities Serves as a technical program coordinator supporting customer security accreditation activities Serves as a technical liaison between government agencies and prime contractors in customer-facing recurring meetings, milestone reviews, and documentation with key stakeholders. Applies technical expertise to review engineering designs for security deficiencies such as red/black separation and zeroization in critical scenarios. Drafts processes for proper COMSEC and crypto key management for pilots and flight personnel. Advises and contributes to the development of test plans for both physical and logical interfaces to ensure compliance with requirements set by the accreditation bodies. Serves as the Customer focal point for managing projects through certification processes for cryptographic devices, as well as associated tactical systems with the DoD Risk Management Framework (RMF) Supports hardware and software security assessments for embedded and cyber-physical systems Collaborates with cross-functional teams to ensure project success and timely delivery Necessary Qualifications Bachelor's degree with 5-10 years of experience Background in cyber security, engineering, technical program management, or related technical field Active TS/SCI security clearance Project or Program management experience with strong organizational skills and high attention to detail Familiarity working with platform IT developer teams and supporting their ability to successfully satisfy SERD (IASRD) and CDRD (TSRD) requirements Experience supporting government activities for certification and the Authority To Operate (ATO) processes, particularly for cryptographic systems Strong communication skills and ability to collaborate with diverse stakeholders Nice-to-Have Qualifications Master's degree in a relevant field Experience performing security assessments for embedded and cyber-physical systems In-depth knowledge of cryptographic algorithms and protocols (e.g., SHA-2, AES-256, RSA) Familiarity with CNSA 2.0 cryptographic standards Familiarity with radio frequency RF and COMSEC equipment Experience with Air Force platforms Location This role will be in Beavercreek / Dayton, OH and on the Wright-Patterson Air Force Base (WPAFB). This will be a hybrid work arrangement and may require occasional travel between Dayton, OH and the east coast. Relocation assistance is available. Security and Citizenship Requirement The employee must be a US Citizen with an active TS/SCI Benefits of Note We offer a robust benefits package to provide for your and your family's well-being, including: 401(k) retirement plan with 5% employer match and immediate vesting Fully paid medical insurance plans for you and your family Employer paid dental and vision plans for you and your family 5 weeks of PTO and 11 days of paid company holidays each year Application Instructions Only candidates applying directly to our posted job opening will be considered. We are not accepting unsolicited resumes from recruiters or employment agencies at this time. More About ExistX Types of Tech-Enabled Services We Offer: Bespoke Digital Solutions: We specialize in crafting bespoke digital solutions tailored specifically to the unique needs of each client, with a security conscious and cloud first approach. Solution Integration: We excel in integrating new digital solutions into existing commercial off the shelf (COTS) tools/platforms, systems and operational environments. Technology Transition Consulting: We provide subject matter expert reach back leveraging our extensive hands-on experience in transitioning research from the lab to the marketplace, ensuring that new solutions are not only developed to meet end-user needs but also deliver value swiftly and effectively. Our domains of expertise: Cryptography: At ExistX, our expertise in applied cryptography encompasses a wide range of secure communication and information protection technologies. We specialize in developing digital solutions with next generation cryptographic research breakthroughs offering novel approaches to data integrity and confidentiality across various systems, devices, platforms and networks. Cyber-Physical Systems (CPS): Our skill in applied cyber-physical systems (CPS) lives between the user interface to the intersection of the software to the hardware. We are experts in cyber reliability, resiliency, and trust across systems, platforms, devices, and networks. Automated Reasoning: Our focus within the realm of Artificial intelligence and Machine Learning (AI/ML) are technologies that increase AI/ML user adoption. We develop bespoke digital solutions and plug-ins for COTS that enable end users to adopt and sustain trustworthy, intelligent AI/ML powered systems that enhance decision-making and automate complex decision processes. Equal Employment Opportunity ExistX is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race, ethnicity, national origin, ancestry, color, sex, gender identity or expression, sexual orientation, marital or parental status, pregnancy or childbirth, disability, age, religion, creed, genetic information, veteran status, or any other characteristic protected by applicable federal, state, or local law. We encourage and respect different viewpoints and experiences as being essential to the process of innovation. We strive to acquire, grow, and maintain a diverse and inclusive workplace that applies principles and standards equitably while supporting the needs and accommodations of the individual employee. Consistent with the Americans with Disabilities Act (ADA) and federal and state laws, it is the policy of ExistX. to provide reasonable accommodation when requested by a qualified applicant or employee with a disability unless such accommodation would cause an undue hardship. If you require reasonable accommodation in completing the employment application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection -process, please contact ****************.
    $68k-94k yearly est. Easy Apply 60d+ ago

Learn More About Cyber Security Analyst Jobs

How much does a Cyber Security Analyst earn in Reading, OH?

The average cyber security analyst in Reading, OH earns between $63,000 and $113,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average Cyber Security Analyst Salary In Reading, OH

$84,000

What are the biggest employers of Cyber Security Analysts in Reading, OH?

The biggest employers of Cyber Security Analysts in Reading, OH are:
  1. Per Scholas
Job type you want
Full Time
Part Time
Internship
Temporary