Cyber security analyst jobs in Rocky Point, NY - 428 jobs
All
Cyber Security Analyst
Security Engineer
Information Security Analyst
Cyber Security Engineer
Senior Security Analyst
Defense Analyst
Information Security Officer
Senior Information Security Analyst
Cyber Security Specialist
Securities Analyst
Network Security Analyst
Security System Engineer
Senior Security Analyst
Capgemini 4.5
Cyber security analyst job in New York, NY
Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you'd like, where you'll be supported and inspired bya collaborative community of colleagues around the world, and where you'll be able to reimagine what's possible. Join us and help the world's leading organizationsunlock the value of technology and build a more sustainable, more inclusive world.
The Senior SecurityAnalyst supports the governance of service provider activities in the enterprise security program, monitoring and escalating problems and providing information on security issues. Undertakes security assurance and audit activities to ensure compliance and to identify risks and opportunities. Provides information to senior managers and executives to ensure that they are aware of any security-related risks or opportunities. Provides subject matter expertise, consultancy and training in security-related matters. Must be able to function in a fast-paced, multi-vendor outsourced environment, facilitating conference calls among other subject matter experts and the client.
Responsibilities
Handles monthly reporting duties for the Information Risk Management team.
Facilitates audit planning and audit remediation activities of the service providers, leading calls and documenting and reporting progress.
Has familiarity with security technologies and controls; expertise not required, but the ability to escalate to more senior subject matter experts is important.
Develops work plans to structure solutions and communications.
Involves client and vendor staff appropriately in resolving security problems.
Participates effectively within the business' security governance framework.
Tracks the corrective and preventive actions being taken to improve security to closure.
Possesses strong communication skills to communicate technical and security risk information to management.
Experience
Ability to self-manage with little interaction from other management staff.
Flexible and able to adapt to manage a fast‑changing environment.
Ability to solve complex issues and provide recommendations and advice regarding remediations.
Experience with security architecture, security software, or security policy.
Ability to organize agendas, lead conference calls, and track action items to completion.
Security and Audit certifications such as SSCP, CISSP, CISA, CISM, CGEIT, CRISC, Security+ are preferred.
Job Description - Grade Specific
The base compensation range for this role in the posted location is: $65,586-121,980.
Capgemini provides compensation range information in accordance with applicable national, state, provincial, and local pay transparency laws. The base compensation range listed for this position reflects the minimum and maximum target compensation Capgemini, in good faith, believes it may pay for the role at the time of this posting. This range may be subject to change as permitted by law.
The actual compensation offered to any candidate may fall outside of the posted range and will be determined based on multiple factors legally permitted in the applicable jurisdiction.
These may include, but are not limited to: Geographic location, Education and qualifications, Certifications and licenses, Relevant experience and skills, Seniority and performance, Market and business consideration, Internal pay equity.
It is not typical for candidates to be hired at or near the top of the posted compensation range.
In addition to base salary, this role may be eligible for additional compensation such as variable incentives, bonuses, or commissions, depending on the position and applicable laws.
Capgemini offers a comprehensive, non‑negotiable benefits package to all regular, full‑time employees. In the U.S. and Canada, available benefits are determined by local policy and eligibility and may include:
Paid time off based on employee grade (A-F), defined by policy: Vacation: 12‑25 days, depending on grade, Company paid holidays, Personal Days, Sick Leave
Medical, dental, and vision coverage (or provincial healthcare coordination in Canada)
Retirement savings plans (e.g., 401(k) in the U.S., RRSP in Canada)
Life and disability insurance
Employee assistance programs
Other benefits as provided by local policy and eligibility
Important Notice: Compensation (including bonuses, commissions, or other forms of incentive pay) is not considered earned, vested, or payable until it becomes due under the terms of applicable plans or agreements and is subject to Capgemini's discretion, consistent with applicable laws. The Company reserves the right to amend or withdraw compensation programs at any time, within the limits of applicable legislation.
Disclaimers
Capgemini is an Equal Opportunity Employer encouraging inclusion in the workplace. Capgemini also participates in the Partnership Accreditation in Indigenous Relations (PAIR) program which supports meaningful engagement with Indigenous communities across Canada by promoting fairness, accessibility, inclusion and respect. We value the rich cultural heritage and contributions of Indigenous Peoples and actively work to create a welcoming and respectful environment. All qualified applicants will receive consideration for employment without regard to race, national origin, gender identity/expression, age, religion, disability, sexual orientation, genetics, veteran status, marital status or any other characteristic protected by law.
Physical, mental, sensory or environmental demands may be referenced in an attempt to communicate the manner in which this position traditionally is performed. Whenever necessary to provide individuals with disabilities an equal employment opportunity, Capgemini will consider reasonable accommodations that might involve varying job requirements and/or changing the way this job is performed, provided that such accommodation does not pose an undue hardship. Capgemini is committed to providing reasonable accommodation during our recruitment process. If you need assistance or accommodation, please reach out to your recruiting contact.
Ref. code 385096-en_US
Posted on 05 Jan 2026
Contract type Permanent
Location Atlanta, Austin, Bellevue, Berwyn, Bridgewater, Brooklyn, Burlington, Chicago, Columbia, Dallas, Dayton - Sogeti US, Guaynabo, Houston, Irving, Mclean, Nashville, New York, San Francisco, Santa Clara, Seattle, Southfield, Tampa, Westerville
#J-18808-Ljbffr
$65.6k-122k yearly 2d ago
Looking for a job?
Let Zippia find it for you.
Cyber Security Engineer
Beocom Technologies, LLC
Cyber security analyst job in New York, NY
We need a CyberSecurity Engineer who's ready to defend against evolving digital threats. You'll design and implement enterprise-grade security controls, perform vulnerability assessments, and respond to incidents - keeping client and company data safe. You'll work closely with infrastructure and application teams to ensure security is baked into every layer of our technology stack. Your expertise will directly reduce risks, maintain compliance, and protect critical business assets.
Requirements
Full-time position with occasional after-hours incident response.
Ability to travel for on-site security assessments if required.
Dedication to staying informed on new attack vectors and mitigation techniques.
Qualifications
Experience: 5+ years in a cybersecurity engineering role.
Education: Bachelor's degree in Cybersecurity, Computer Science, or related field.
Certifications: CISSP, CEH, or Security+ preferred.
Proven track record in threat detection and incident handling.
Technical Skills
Proficiency with SIEM platforms, IDS/IPS, firewalls, and endpoint protection.
Strong knowledge of vulnerability scanning and penetration testing tools.
Familiarity with compliance frameworks like NIST, ISO 27001, or PCI DSS.
Expertise in identity management and secure access control.
Professional Skills
Analytical mindset with strong attention to detail.
Ability to act decisively under pressure.
Excellent documentation and reporting skills.
Benefits
Competitive salary and security certification reimbursements.
Access to cutting-edge cybersecurity tools.
Comprehensive benefits package.
Growth path to senior leadership roles in security.
#J-18808-Ljbffr
Duration: 11+ Months Contract
Contract
Interview Type: In-person
Scheduled Work Hours: Normal business hours Monday-Friday 35 hours/week (not including mandatory unpaid meal break after 6 hours of work).
Requirement ID: NYC_OT735_SS
contact Sandeep @ **********************
Job Description
Justification:
This request is for an NG911 Subject Matter Expert (SME) needed to continue the project work for the Class 1/2/3 and Call Handling upgrades of the Next Generation 9-1-1 emergency call system and provide expertise and technical knowledge during the configuration and test phases.
NG911 - CyberSecurity Tools Implementation Engineer
Implement solutions for DNS, Email, remote access configuration, integration, performance monitoring, and security management.
Test Next Generation firewall platforms, host operating systems, and applications such as LDAP, SMTP.
Support for application development and database administration.
Provide support for Email, DNS, AND Remote access solutions.
Deploy appropriate network security solutions.
Note:
Normal Business Hours, Monday through Friday (not including a mandatory unpaid meal break after 6 hours of work), 35 work hours per week. If the consultant works more than 35 hours per week, the consultant must request overtime in the Agency's timekeeping system, and the project manager must approve those hours worked above the weekly maximum.
SCOPE OF SERVICES:
NG911 - CyberSecurity Tools Implementation Engineer
Implement solutions for DNS, Email, remote access configuration, integration, performance monitoring, and security management.
Test Next Generation firewall platforms, host operating systems, and applications such as LDAP, SMTP.
Support for application development and database administration.
Provide support for Email, DNS, AND Remote access solutions.
Deploy appropriate network security solutions.
MANDATORY SKILLS/EXPERIENCE
Note: Candidates who do not have the mandatory skills will not be considered
At least 12 years of experience in an enterprise data center environment to plan, design, and install network & security infrastructure systems for public safety.
3+ years working experience with IBM QRadar SEIM solution integration with Cascade, Firemon, and Citrix & other critical security service technologies
CISSP or other industry CyberSecurity Certification
Experience migrating DNS to a new platform.
Experience participating in the design and implementation of a DMZ and all associated requirements for monitoring external threats.
Experience with security infrastructure and implementation of perimeter network security components such as Next Generation firewalls.
DESIRABLE SKILLS/EXPERIENCE:
3+ years working experience with IBM QRadar SEIM solution integration with Cascade, Firemon, and Citrix & other critical security service technologies
CISSP or other industry CyberSecurity Certification
Experience migrating DNS to a new platform.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------
V Group Inc. is an IT Services company which supplies IT staffing, project management, and delivery services in software, network, help desk and all IT areas. Our primary focus is the public sector including state and federal contracts. We have multiple awards/ contracts with the following states: CA, FL, GA, MD, MI, NC, NY, OH, OR, PA, VA, VT, and WA. If you are considering applying for a position with V Group, or in partnering with us on a position, please feel free to contact me for any questions you may have regarding our services and the advantages we can offer you as a consultant.
Please share my contact information with others working in Information Technology.
$81k-109k yearly est. 2d ago
Staff AI Security Engineer - Secure-by-Default & AI Defense
The Browser Company
Cyber security analyst job in New York, NY
A tech company focused on browser innovations is seeking a Security Software Engineer in New York. This role involves designing and shipping security features, ensuring the product's security architecture is robust against AI-driven risks, and requires strong coding skills in languages such as Golang or Python. The ideal candidate will have over 5 years of experience in security engineering, will collaborate with multiple teams, and will enjoy a supportive, diverse workplace.
#J-18808-Ljbffr
$90k-124k yearly est. 4d ago
Chief Information Security Officer
The Subway HR Team
Cyber security analyst job in Shelton, CT
Title - Chief Information Security Officer
Ready for a fresh, new career? Look no further because one of the world's most iconic brands can help you get there.
Why Join Us?
At Subway, “better” is baked into our DNA. We are a brand that believes in continued improvement … in our lives, our businesses, and our planet. From the handshake that started our very first sandwich shop to earning our position as one of the world's leading restaurant brands, we've always embraced change and the path ahead. And today, we're making better living way easier.
Our purpose is more than the food we serve in our restaurants. It's centered on fueling healthy businesses and healthier lives. It is one of the most exciting times to join the Subway team and contribute to our transformational journey.
About the Role:
The Chief Information Security Officer is responsible for leading the organization's cybersecurity strategy and operations. This role is focused on protecting company data, systems, and networks from cyber threats, ensuring the confidentiality, integrity, and availability of critical information assets. The CISO develops and implements cybersecurity policies, technologies, and incident response plans to defend against evolving threats and vulnerabilities and drives continuous improvement in the organization's cyber defense posture.
Responsibilities
Develop and implement a comprehensive cybersecurity strategy aligned with the organization's business goals, focusing on the protection of data, systems, and networks.
Establish and enforce information security policies, standards, and procedures to ensure compliance with relevant laws, regulations, and industry best practices.
Develop and oversee incident response plans for operational risks.
Oversee incident response plans to effectively address and mitigate the impact of security incidents.
Oversee the monitoring of networks and systems for security breaches, vulnerabilities, and suspicious activity; coordinate rapid response to cyber incidents.
Continuously assess and prioritize cybersecurity risks, considering emerging threats, vulnerabilities, and technology trends.
Select and implement appropriate security controls and technologies to defend against cyber threats.
Regularly report on the organization's information security risk posture to executive leadership and relevant stakeholders. Collaborate with IT and business leaders to integrate cybersecurity considerations into technology projects and business processes
Manage third-party risk as it relates to cybersecurity, ensuring vendors and partners adhere to company security standards.
Foster an information security aware culture by promoting best practices and proactive security/risk management behaviors.
Develop and deliver training programs to enhance operational information security awareness across the organization. Implement programs to raise awareness of information security risks among employees and stakeholders.
Ability to align cybersecurity with business objectives.
Deep expertise in cybersecurity technologies, threat intelligence, and incident response.
Strong understanding of network, system, and application security
Experience with security operations centers (SOC), vulnerability management, and penetration testing.
Leadership and team management skills.
In-depth knowledge of cybersecurity technologies and trends.
Leadership and team management capabilities.
Knowledge of relevant regulatory requirements and industry best practices. (e.g., NIST, ISO 27001, GDPR).
Strong knowledge of industry regulations, standards, and best practices.
Qualifications
Bachelor's Degree Business, Finance, Risk Management, Information Security, Computer Science, or a related field.
15 or more Extensive experience in cybersecurity, information security, or related technical fields, with a proven track record in leadership roles.
Demonstrated experience in designing and managing enterprise cybersecurity programs, incident response, and security operations
What do we Offer?
Pension/401K/RSP (country specific)
Competitive Bonus
Tuition Reimbursement
Company Holidays
Volunteering time
And Many More…..
Actual pay is determined based on several job-related factors including skills, education, training, credentials, qualifications, scope and complexity of role responsibilities, geographic location, performance, and working conditions.
#J-18808-Ljbffr
$125k-187k yearly est. 5d ago
Network Security Analyst
Skadden 4.9
Cyber security analyst job in White Plains, NY
We invite you to review our current business services professionals openings to learn about the opportunities available across the firm.
About Us
Skadden, Arps, Slate, Meagher & Flom LLP has forged a reputation as one of the most prestigious law firms in the world. Relying on innovation, intellect, teamwork and tenacity, our lawyers deliver the highest quality advice and novel solutions to our clients' legal issues. We are known for handling the most complex transactions, litigation/controversy issues, and regulatory matters, as well as for the strong partnerships we build with clients and each other. Our attorneys, who reflect a broad range of experiences and perspectives, work together seamlessly across 50-plus practices and 21 offices in the world's major financial centers.
The Opportunity
We are seeking two Network SecurityAnalysts to join our Firm. These positions will be based in our White Plains office (hybrid), and please note the roles have different shift times, listed below. The Network SecurityAnalysts are responsible for implementing and supporting network security solutions for the Firm and, implementing and enforcing practical solutions to secure the Firm's internal and external network infrastructure.
Available Shift Times (EST- Hybrid)
1.) Saturday - Sunday: 7:00 a.m. - 8:00 p.m. EST & Monday 7:00 a.m. - 7:00 p.m.
2.) Monday - Friday: 2:00 p.m. - 10:00 p.m.
Note: The scheduled hours listed may be flexible and will be discussed during the interview process.
Responsibilities
Performs daily review of automated security reports and escalate as necessary.
Responds to system generated security alerts and coordinate responses.
Assists with internal audits, vulnerability scans and risk assessments.
Assists with annual penetration testing, review of findings and tracking issue resolution.
Participates in evaluating new technologies or new versions of existing products.
Works with project teams to implement secure network connectivity solutions.
Writes and maintains technical documentation including procedures and troubleshooting guides.
Demonstrates effective interpersonal, written and verbal communication skills to facilitate effective work relationships with others.
Manages Firm resources responsibly.
Complies with and understands Firm operation, policies and procedures.
Performs other related duties as assigned.
Qualifications
Knowledge of relevant firm computer software programs (e.g., Outlook, Excel, PowerPoint), with the ability to learn new software and operating systems
Proficient with Access, Project and Visio
Thorough knowledge of network management and security technologies and approaches
Thorough knowledge of security techniques, latest protocols and defenses
Proficient with Microsoft Active Directory and Operating Systems
Basic ability to program scripts and batch files
Demonstrates effective interpersonal and communication skills, both verbally and in writing
Demonstrates close attention to detail
Excellent analytical, troubleshooting, organizational, and planning skills
Ability to handle multiple projects and shifting priorities
Ability to handle sensitive matters and maintain confidentiality
Ability to organize and prioritize work
Ability to work well in a demanding and fast-paced environment
Ability to work well independently as well as effectively within a team
Ability to use discretion and exercise independent and sound judgment
Flexibility to adjust hours and work the hours necessary to meet operating and business needs
Education/Experience
Bachelor's degree or equivalent
Minimum of two years' experience in multi-national enterprise IT
Culture & Life at Skadden
What makes Skadden special is our people and the culture, community and spirit of collaboration we have created. We believe in teamwork and inspiring each other to be our best in an atmosphere that promotes professionalism and excellence in all that we do. We know that inclusion and drawing on the strength of a wide spectrum of talent only make us better and is vital to the firm's success. Our goal is for everyone at the firm to enjoy a challenging career with opportunities for development and growth and to support the well-being of our attorneys and business services professionals.
Benefits
The overall well-being of our team is important to us. We offer generous benefits to help you achieve wellness in all areas of your life.
Competitive salaries and year-end discretionary bonuses.
Comprehensive health care (medical, dental, vision), savings plan/401(k) and voluntary benefits.
Generous paid time off.
Paid leave options, including parental.
In-classroom, remote, and on-demand learning and professional development opportunities.
Robust well-being classes and programs.
Opportunities to give back and make an impact in local communities.
For further details, please visit: *******************************************************
Skadden is an Equal Opportunity Employer (Disability/Vet/other protected categories). For more information, please visit Skadden.com/careers.
The starting base salary for this position is expected to be within the range listed under Salary Details. Actual salary will be determined based on skills, experience (to the extent relevant) and other-job related factors, consistent with applicable law.
Salary Details
$125,000 -$140,000
EEO Statement
Skadden is an Equal Opportunity Employer. It does not discriminate against applicants or employees based on any legally impermissible factor including, but not limited to, race, color, religion, creed, sex, national origin, ancestry, age, alienage or citizenship status, marital or familial status, domestic partnership status, caregiver status, sexual orientation, gender, gender identity or expression, change of sex or transgender status, genetic information, medical condition, pregnancy, childbirth or related medical conditions, sexual and reproductive health decisions, disability, any protected military or veteran status, or status as a victim of domestic or dating violence, sexual assault or offense, or stalking.
Applicants who require an accommodation during the application process should contact Alex Taylor at **************.
Skadden Equal Employment Opportunity Policy
Skadden Equal Employment Opportunity Policy
Applicants Have Rights Under Federal Employment Law
Applicants Have Rights Under Federal Employment Law
In accordance with the Transparency in Coverage Rule,
click here to review machine-readable files made available by UnitedHealthcare:
Transparency in Coverage
$125k-140k yearly Auto-Apply 49d ago
Cyber Security Analyst
K Systems Solutions 4.0
Cyber security analyst job in New York, NY
Client Name: City of New York
Contract Length (in weeks): 312
Scope of Services: The Contractor/cybersecurityanalyst would perform a variety of services, both in -person at NYC Health Department locations and, if needed, remotely, including but not limited to:
Identifying and mitigating complex IT technical threats to computer systems, networks, and data.
Using technical IT tools and IT software to monitor, analyze, and defend against cyber -attacks.
Monitoring and analyzing network traffic, configuring firewalls, intrusion detection/prevention systems and conducting vulnerability assessments.
Managing and protecting endpoints such as desktops, laptops, servers, and mobile devices from malware, ransomware, and other threats.
Investigating security incidents, identifying root causes, and implementing corrective actions to prevent future occurrences.
Utilizing SIEM tools to collect, correlate and analyze security event data for threat detection and responses.
Monitoring and analyzing emerging threats, vulnerabilities, and attack vectors to proactively defend against cyber threats.
Performing Penetration testing.
Keeping abreast of the latest security, privacy, and regulatory concerns and best practices impacting third party risk management.
Advising the agency on any changes requested by third parties to security and privacy provisions of agreements or contracts.
Collaborating with IT project management and operational teams to design secure cloud infrastructure plans and services.
Performing analysis on the security of all cloud services, including but not limited to: AWS, Microsoft Azure, Google, etc.
Providing subject matter expertise on cloud security, automation, and virtualization.
Developing, documenting, and validating policies, processes, and procedures relating to a variety of cloud concepts and standards.
Developing cloud security metrics to analyze risks and identify potential opportunities to reduce vulnerabilities.
Collaborating with all parties and the city's Cyber Command Center to obtain cloud solution dispositions and update agency inventory lists.
RequirementsExperience and Organizational Capability:
The contractor/cybersecurityanalyst would have the following credentials, organizational capability, and/or experience:
A bachelor's degree in information technology or Computer Science.
An industry recognized certification within the domains of information security and privacy (e.g., CISSP, GIAC, CISM, CISA, CIPP, CTPRP, CCSP, etc.).
A minimum of three (3) years of experience working in an IT or computer -related field. Greater consideration will be given to contractors with greater than 5 years of experience.
A minimum of three (3) years of hands -on technical experience in cloud administration.
At least 1 year of experience:
with Cloud Cybersecurity efforts and emerging technology aligned with the Risk Management Framework (RMF).
in an Information & Network Security occupation preferred.
in a cybersecurity -related occupation preferred.
A minimum of three (3) years of experience in:
applying information security and privacy fundamentals.
applying risk management frameworks such as NIST, FISMA, or ISO 27000.
SSAE 16, SOC 2, Shared Assessments, FedRAMP, and other vendor risk assessment methodologies.
Governance, Risk, and Compliance (GRC) and vendor risk management tools.
technical IT expertise in areas such as network IT protocols, IT operating systems, IT programming languages, encryption techniques, and intrusion detection systems to effectively analyze and respond to cybersecurity threats.
Excellent oral and written communication, ability to convey technical and security related concepts to people at all levels of the organization.
Proficiency in the design and implementation of effective information security controls with minimal oversight.
Acute attention to detail with a high level of data integrity and accuracy.
Strong organizational and prioritization skills to handle multiple priorities.
Must be able to work both on -site and, if needed, remotely
$82k-114k yearly est. 60d+ ago
Cyber Command Forensic Analyst
Govserviceshub
Cyber security analyst job in New York, NY
Job Title: Cyber Command Forensic Analyst
SCOPE OF SERVICES:
The forensics Analyst will investigate network intrusions and other cyber incidents to determine cause, extent and consequences of the breach.
TASKS:
· Research and develop new techniques, and procedures to continually improve the digital forensics process.
· Produce high quality written work product presenting complex technical issues clearly and concisely.
· Managing and maintaining the analysis labs and forensics tools leveraged for investigations.
· Ensuring data is collected and preserved within industry standard best practices and in alignment evidence integrity requirements.
· Assisting the Cyber Emergency Response Team during critical incidents.
· Investigate network intrusions and other cybersecurity incidents to determine the cause and extent of the breach. Includes ability to perform host -based and network -based forensic analysis.
MANDATORY SKILLS/EXPERIENCE:
· Minimum 4 years of experience in Threat Management/Forensics Investigations/Incident Response environment
· Proficient in performing digital forensic investigations on a variety of platforms and operating systems with a deep understanding of digital forensics processes and tools.
Requirements
DESIRABLE SKILLS/EXPERIENCE:
· Experience with a wide range of forensic tools (FTK, X -Ways, SIFT, AXIOM, EnCase, etc.)
· Experience with memory analysis tools (i.e. Volatility, MemProcFS)
· Experience with Linux and open source tools
· Experience investigating intrusions on Windows and Linux/Unix operating systems
· Experience with performing forensics collections in cloud environments (AWS, Azure, GCP)
· Knowledge of gathering, accessing, and assessing evidence from computer systems and electronic devices
· Knowledge of virtual environments
· Knowledge of forensic imaging techniques
· Knowledge of Microsoft Windows operating system and Windows artifacts
· Knowledge of Linux/UNIX operating systems and artifacts
· Knowledge of mac OS operating system and forensics artifacts
· Knowledge of file systems
· Strong analytical skills
Skills:
· Incident Management
· Threat Management
· CyberSecurity
$80k-109k yearly est. 33d ago
Cyber Security Analyst
Zone It Solutions
Cyber security analyst job in New York, NY
Job Description
We is seeking a talented CyberSecurityAnalyst. As a CyberSecurityAnalyst, you will play a key role in ensuring the security and integrity of our organization's data and systems.
Requirements
Responsibilities:
Monitor, detect, and respond to cyber threats and security incidents,
Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems,
Develop and implement security measures and best practices to protect against cyber attacks,
Stay up-to-date with the latest cybersecurity trends and technologies,
Collaborate with cross-functional teams to identify security risks and implement appropriate solutions,
Provide training and guidance to employees on cybersecurity awareness and best practices.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field,
Proven experience in cybersecurity or a related role,
Strong knowledge of security protocols and tools,
Ability to analyze and interpret complex data and make informed decisions,
Excellent problem-solving and communication skills,
Relevant certifications (e.g. CISSP, CISM) are preferred but not required.
Benefits
About Us
Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************.
Also, follow our LinkedIn page for new job opportunities and more.
Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
$80k-109k yearly est. Easy Apply 9d ago
Global Cyber Wordings Analyst
Liberty Mutual 4.5
Cyber security analyst job in New York, NY
Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience.
Key responsibilities:
Wording library and drafting support
Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes.
Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards.
Track version control, change logs, approvals, and archiving;
Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance.
Commercial enablement
Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently.
Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives.
Triage wording queries from regions; track SLAs and referral approvals per the global governance framework.
Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards.
Regulatory and legal stewardship
Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions.
Maintain audit-ready documentation; assist with regulatory filings or attestations where required.
Claims partnership and feedback loop
Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty.
Support coverage position letters and documentation packs with research, citations, and clause histories.
Innovation and product development support
Help draft prototype wordings for new propositions
Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses.
Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics.
Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders.
Qualifications
Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience.
2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred.
Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail.
Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous.
Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates.
Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools.
Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs.
Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting.
About Us
Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role.
At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve.
We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: ***********************
Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law.
Fair Chance Notices
California
Los Angeles Incorporated
Los Angeles Unincorporated
Philadelphia
San Francisco
We can recommend jobs specifically for you! Click here to get started.
$86k-112k yearly est. Auto-Apply 5d ago
Experienced Analyst - Strategic, Defense, and Shareholder Advisory
Evercore 4.9
Cyber security analyst job in New York
Primary Responsibilities: The Analyst will provide value add analysis and research as part of the Strategic, Defense, and Shareholder Advisory team within the Advisory business. In this role, the Analyst will create client presentations regarding hostile activity, proxy fights, shareholder activism, and corporate governance. The Analyst will work on live activism and raid defense situations, as well as create materials for use in client presentations, internal meetings, and marketing initiatives. The Analyst will work in a team environment within Evercore's Strategic, Defense, and Shareholder Advisory practice.
Responsibilities include, but are not limited to the following:
Create materials related to shareholder activism, hostile activity, shareholder engagement and corporate governance for use in client presentations, internal meetings and marketing initiatives
Support live engagements, including proxy fights and raid defense situations, contested M&A and special committee assignments
Perform research and analysis to identify company's potential vulnerabilities to activist shareholders or potential acquirors
Monitor relevant trends and regulatory developments
Collaborate closely with senior bankers and other internal teams on strategic mandates
Specific Qualifications:
Graduate of Class of 2024 through Class of 2025
Relentless work ethic and high energy level
An excellent, team-based atttiude
Excellent communication skills (written and verbal)
Proficient in Microsoft Office, specifically Excel
Exceptional attention to detail
Calm under pressure with a demonstrated track record of successfully managing multiple projects simultaneously
Intellectual curiosity and an interest in finance
Expected Base Salary Range: $120,000-$140,000.
In addition to a competitive base salary, employees may be eligible to receive a discretionary bonus delivered in the form of cash and/or deferred equity. Evercore also offers a variety of benefits and programs, subject to eligibility. These include, but are not limited to:
Medical, prescription, dental, and vision insurance, including healthcare savings and reimbursements accounts
401(k) Retirement Plan
Life and disability insurance, including additional voluntary financial protection insurance
Well-being resources and programs, including mental health and mindfulness programs, digital wellness platforms, well-being events, and targeted on-site health services
Family-building and family-support benefits
Paid parental, caregiver, marriage and bereavement leave
Commuter benefits, health club membership discounts, and other corporate discounts
Paid holidays, vacation days, personal days, sick days, and volunteer opportunities
$120k-140k yearly 19d ago
Sr. Security Portfolio TPM
Adobe Systems Incorporated 4.8
Cyber security analyst job in New York, NY
Our Company Changing the world through digital experiences is what Adobe's all about. We give everyone-from emerging artists to global brands-everything they need to design and deliver exceptional digital experiences! We're passionate about empowering people to create beautiful and powerful images, videos, and apps, and transform how companies interact with customers across every screen.
We're on a mission to hire the very best and are committed to creating exceptional employee experiences where everyone is respected and has access to equal opportunity. We realize that new ideas can come from everywhere in the organization, and we know the next big idea could be yours!
The Opportunity
The Adobe Security organization seeks a proactive force multiplier with experience skillfully leading multiple technical programs, running a healthy portfolio, working directly with leadership, and delighting stakeholders. Our ideal candidate has superb communication and relationship-building skills and a solid track record of driving business outcomes through managing large programs. In addition, familiarity with fundamentals in key security operations and related security compliance frameworks could help this candidate have an immediate impact. If you excel at navigating complexity with multiple internal customers, are a master planner who helps teams foresee challenges and risks and guides them through them, and are equipped with a diverse technical program management toolbox, we can't wait for you to join our Security PMO team!
What you'll Do
* Partner directly with security leadership to build a portfolio of key programs. Lead and monitor the health and execution of several key initiatives with insights into status, risks, dependencies, roadblocks, and budget across the organization's program portfolio.
* Ensure a healthy program portfolio in Adobe's Technology GRC (Governance, Risk, and Compliance) organization with a clearly defined roadmap.
* Bring together cross-functional teams to deliver business outcomes for high-priority programs through clear planning, execution, partnership, and communication.
* Make things easier for all collaborators of your program portfolio by driving simplicity, clarity, and efficiency in all aspects of your work.
* Reduce program risk by proactively identifying, communicating, and removing roadblocks.
* Build trust through visibility. Provide accurate and timely data-driven status reports for a broad audience and lead executive governance meetings.
* Effectively handle program financials, including driving accurate budget forecasts.
What you need to succeed
* Exceptional communication skills for effective engagement with both engineers and executives in meetings, presentations, and writing. Excel at building strong and trusted partner relationships.
* 7+ years as a program manager in the security domain with portfolio-level oversight experience. Demonstrate strong knowledge in the compliance field and have worked closely with the compliance teams on projects.
* Experience leading programs involving AI systems and workflows (e.g., MCP servers, RAG capabilities, LLM integrations, or related AI infrastructure).
* Established history of effectively managing programs from inception, prioritizing, and strategizing to implementation, reporting, and successful delivery of intricate projects with many significant internal customers.
* Demonstrated Agile practice experience in software projects and familiarity with Jira (including query and dashboarding), O365 Suite, MS Teams, SharePoint, MS Project, Excel, and Miro or equivalent experience
* Familiarity with compliance frameworks such as ISO 42001, SOC2, HIPAA, PCI DSS, ISO27001, ISO27017/18, ISO22301, and Geo-compliance programs.
* Preferred Certifications: CISSP, CISM, PMP, or equivalent credentials demonstrating expertise in cybersecurity and program leadership.
Our compensation reflects the cost of labor across several U.S. geographic markets, and we pay differently based on those defined markets. The U.S. pay range for this position is $124,300 -- $234,600 annually. Pay within this range varies by work location and may also depend on job-related knowledge, skills, and experience. Your recruiter can share more about the specific salary range for the job location during the hiring process. In California, the pay range for this position is $162,000 - $234,600 In New York, the pay range for this position is $162,000 - $234,600
At Adobe, for sales roles starting salaries are expressed as total target compensation (TTC = base + commission), and short-term incentives are in the form of sales commission plans. Non-sales roles starting salaries are expressed as base salary and short-term incentives are in the form of the Annual Incentive Plan (AIP).
In addition, certain roles may be eligible for long-term incentives in the form of a new hire equity award.
State-Specific Notices:
California:
Fair Chance Ordinances
Adobe will consider qualified applicants with arrest or conviction records for employment in accordance with state and local laws and "fair chance" ordinances.
Colorado:
Application Window Notice
If this role is open to hiring in Colorado (as listed on the job posting), the application window will remain open until at least the date and time stated above in Pacific Time, in compliance with Colorado pay transparency regulations. If this role does not have Colorado listed as a hiring location, no specific application window applies, and the posting may close at any time based on hiring needs.
Massachusetts:
Massachusetts Legal Notice
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
Adobe is proud to be an Equal Employment Opportunity employer. We do not discriminate based on gender, race or color, ethnicity or national origin, age, disability, religion, sexual orientation, gender identity or expression, veteran status, or any other applicable characteristics protected by law. Learn more.
Adobe aims to make Adobe.com accessible to any and all users. If you have a disability or special need that requires accommodation to navigate our website or complete the application process, email accommodations@adobe.com or call **************.
$162k-234.6k yearly 60d+ ago
Cyber Security Engineer
ACLU of Illinois 4.0
Cyber security analyst job in New York, NY
ABOUT THE JOB
The ACLU seeks applicants for the full-time position of Cybersecurity Engineer in the Information Security Department of the ACLU's National office in New York, NY. This is a hybrid role that has in-office requirements of two (2) days per week or eight (8) days per month.
Director of Security Architecture & Engineering, this hands-on technical role is responsible for securing the ACLU's infrastructure, endpoints, and cloud services by reducing vulnerability risk, improving control enforcement, and operationalizing core data protection strategies.
This role is ideal for a security engineer who thrives at the intersection of infrastructure, identity, and data - someone ready to roll up their sleeves to turn policy into technical enforcement. The engineer will drive progress across cloud posture, endpoint compliance, DLP, and insider risk detection, ensuring controls are not just defined but deployed, measurable, and resilient in production environments.
This position is part of a collective bargaining unit. It is represented by ACLU Staff United (ASU).
WHAT YOU'LL DO
Reporting to the Director of Security Architecture & Engineering, the Cybersecurity Engineer will be accountable for executing core infrastructure and endpoint security priorities across cloud, network, and device environments.
YOUR DAY TO DAY
Implement and manage cloud security posture tooling and alerts, ensuring visibility into configuration drift, overexposure, and high-risk services.
Lead the vulnerability management lifecycle - including scanning, prioritization, stakeholder coordination, remediation tracking, and reporting.
Deploy and enforce secure configuration baselines across managed devices (Windows, mac OS, mobile), including disk encryption, patch compliance, and privileged access.
Identify exposed services and reduce attack surface across infrastructure and endpoint environments using automation and policy-based enforcement.
Develop and maintain secure configuration management practices across IAM, network segmentation, endpoint posture, and SaaS platforms.
Engineer and support enterprise Data Loss Prevention (DLP) tooling, including policy definition, control enforcement, and incident response workflows across email, endpoint, and cloud.
Implement and tune insider threat detection signals using endpoint telemetry, behavior analytics, and identity context, in coordination with Security Operations.
Serve as a technical escalation point for endpoint, cloud, and identity security issues impacting control integrity or coverage.
FUTURE ACLU'ERS WILL
Be committed to advancing the mission of the ACLU
Center and embed the principles of equity, inclusion and belonging in their work by demonstrating commitment to diversity with an approach that respects and values multiple perspectives
Be committed to work collaboratively and respectfully toward resolving obstacles and conflicts
WHAT YOU'LL BRING
Demonstrated experience in security engineering, cloud/infrastructure security, or endpoint protection.
Strong working knowledge of DLP, data classification, and endpoint telemetry tooling (e.g., Microsoft Purview, Intune, Defender for Endpoint, Jamf, etc.).
Hands-on experience with vulnerability management platforms and remediation coordination.
Experience designing and deploying secure configurations across Windows, mac OS, and mobile environments.
Familiarity with insider risk detection tooling or behavioral analytics platforms is a strong plus.
Proficiency with scripting or infrastructure-as-code (e.g., PowerShell, Python, Terraform).
Excellent communication and cross-functional collaboration skills, particularly across IT, Legal, and Privacy stakeholders.
Commitment to securing digital systems in a mission-driven and rights-centered environment.
COMPENSATION The ACLU is committed to equity, transparency, and clarity in pay. Consistent with our compensation philosophy, there is a set salary for each role based on geographic work location. The annual salary for this position is $137,206(Level - F), reflecting the salary of a position based in New York, NY. Salaries are subject to a regional pay adjustment if authorization is granted to work outside of the location listed in this posting. For details on our pay structure, please visit: ************************************************************************ WHY THE ACLU
For over 100 years, the ACLU has worked to defend and preserve the individual rights and liberties guaranteed by the Constitution and laws of the United States. Whether it's ending mass incarceration, achieving full equality for the LGBTQ+ community, establishing new privacy protections for our digital age, or preserving the right to vote or the right to have an abortion, the ACLU takes up the toughest civil liberties cases and issues to defend all people.
We know that great people make a great organization. We value our people and know that what we offer is essential not just their work, but to their overall well-being.
At the ACLU, we offer a broad range of benefits, which include:
Time away to focus on the things that matter with a generous paid time-off policy
Focus on your well-being with comprehensive healthcare benefits (including medical, dental and vision coverage, parental leave, gender affirming care & fertility treatment)
Plan for your retirement with 401k plan and employer match
We support employee growth and development through annual professional development funds, internal professional development programs and workshops
OUR COMMITMENT TO ACCESSIBILITY, EQUITY, DIVERSITY & INCLUSION
Accessibility, equity, diversity and inclusion are core values of the ACLU and central to our work to advance liberty, equality, and justice for all. For us diversity, equity, accessibility, and inclusion are not just check-the-box activities, but a chance for us to make long-term meaningful change. We are a community committed to learning and growth, humility and grace, transparency and accountability. We believe in a collective responsibility to create a culture of belonging for all people within our organization - one that respects and embraces difference; treats everyone equitably; and empowers our colleagues to do the best work possible. We are as committed to anti-oppression, anti-ableism, and anti-racism internally as we are externally. Because whether we're in the courts or in the office, we believe ‘We the People' means all of us.
With this commitment in mind, we strongly encourage applications from all qualified individuals without regard to race, color, religion, gender, sexual orientation, gender identity or expression, age, national origin, marital status, citizenship, disability, veteran status and record of arrest or conviction, or any other characteristic protected by applicable law.
The ACLU is committed to providing reasonable accommodation to individuals with disabilities. If you are a qualified individual with a disability and need assistance applying online, please email
************************
. If you are selected for an interview, you will receive additional information regarding how to request an accommodation for the interview process.
The Department of Education has determined that employment in this position at the ACLU does not qualify for the Public Service Loan Forgiveness Program.
$137.2k yearly Auto-Apply 60d+ ago
Senior Security Ops Analyst - Incident Response
Spartan Technologies
Cyber security analyst job in New Hyde Park, NY
We are seeking a Senior Security DevOps Engineer who will be responsible for a variety of objectives resulting in risk mitigation and remediation of internal & external security threats. This role performs advanced threat analysis, threat intelligence gathering & reporting, incident response activities, improves accuracy of security systems, improves existing processes, and works on Cybersecurity focused projects.
Contract to hire
Onsite 2 days a week located in New YorkCybersecurity - Cyber Intelligence & Incident Response
Responds to and remediates email, endpoint, threat intelligence, and network-based threats; provides forensic investigation and support.
Provides after-hours support as needed for response activities.
Integration experience.
Collaborates with cross divisional and Cybersecurity teams to continuously improve security capabilities and response to threats in the most efficient and effective manner.
Assists with projects to implement advanced technologies to prevent & identify malicious behavior within cloud environments, networks, endpoints, and email technologies.
Operates products such as SIEM, SOAR, threat intelligence platforms, advanced email protection, EDR, cloud security products, IDS/IPS, Zero Trust tooling, and other security technologies.
Scripting experience.
Implements and performs threat analysis utilizing industry standard frameworks (kill chain/diamond model) and techniques.
Proposes and helps review security plans and policies to improve environmental security.
Maintains and produces metrics, operational playbooks, process diagrams and documentation for the Cybersecurity program.
AWS and/or Azure knowledge.
Produces and distributes operational and tactical threat intelligence reports.
Other duties may be assigned as needed to address new security threats facing the enterprise.
Ability to:
Demonstrate great teamwork and partnership with internal teams for resolution of security-based issues.
Python programming tasks and understand of programming in general.
Perform security event correlation, triage, and analysis.
Apply security Threat Intelligence while responding to and investigating security events or Incidents.
Identify when an application, network, system, or user has been compromised by an internal or external threat.
Work on multiple projects to improve security capabilities.
Exercise strong understanding of defense-in-depth security best practices.
Apply security engineering and architecture concepts to best understand how to employ the most effective security monitoring, response, and threat reporting.
Demonstrate effective communication of security issues and topics to management and others.
Work well under pressure and within a high paced environment.
Maintain operational guidelines and standards for Cybersecurity.
$95k-130k yearly est. 60d+ ago
Information Security Analyst
Healthsolutions
Cyber security analyst job in New York, NY
Company
$83k-118k yearly est. Auto-Apply 19d ago
Principal Security Information Analyst
Gen Digital
Cyber security analyst job in New York, NY
Principal Information SecurityAnalyst (Tier 2) As a Principal Information SecurityAnalyst within Gen Digital's global Security Operations Center (SOC), you will play a key role in strengthening threat detection and response across the organization. The role focuses on improving SOC monitoring and detection processes through technical expertise, continuous development, and close collaboration with other security teams.
In this position, you will serve as a senior specialist, leading automation and detection engineering efforts, mentoring junior analysts and contributing to projects that enhance security visibility and overall SOC performance.
Operating in a follow-the-sun model, the SOC ensures 24/7 global coverage, with regional teams working during their respective business hours and sharing on-call responsibilities for weekend.
Key Responsibilities:
* Monitor, analyze, and correlate security alerts and events across multiple platforms (SIEM, WAF, EDR, email, cloud, network, and threat intelligence tools) to identify and validate suspicious or malicious activity
* Continuously develop and fine-tune detection rules, correlation searches, security policies, and dashboards to improve visibility, reduce false positives, and increase alert accuracy across security platforms
* Support and mentor Tier 1 analysts in alert triage, escalation quality, and use of tools
* Collaborate with security engineers on automation and enrichment initiatives to streamline operational workflows and improve detection efficiency
* Maintain complete and up-to-date documentation for all detection use cases, workflows and process improvements
* Participate in security projects and collaborate with internal stakeholders (e.g., Incident Response, Security Engineering, Application Security, and IT) to enhance detection coverage, visibility, and response capabilities
* Support the execution of incident response playbooks
Qualification and Work Experience:
* 3-5 years of hands-on experience in SOC operations, cybersecurity monitoring, or related areas such as detection engineering or threat analysis
* Solid understanding of networking concepts (TCP/IP, DNS, HTTP/S) and how they apply to security monitoring and threat analysis
* Strong knowledge of cybersecurity principles, common attack techniques, and threat types (e.g., phishing, malware, brute force, web application attacks)
* Proven experience working with security logs, alerts, and structured data across multiple platforms (SIEM, EDR, WAF, cloud, and network telemetry)
* Hands-on experience with SIEM platforms - Splunk preferred - including detection content development, rule tuning, and dashboard creation
* Familiarity with Web Application Firewall (WAF) technologies and the ability to analyze or tune related alerts and policies
* Understanding of cloud security concepts and experience with monitoring tools for major providers (AWS, Azure, GCP)
* Working knowledge of scripting or automation (e.g., Python, PowerShell, or API-based integrations) to support analysis and enrichment workflows
* Experience using AI-based tools to support daily SOC operations, including data analysis, investigation, documentation, and collaboration
* Strong analytical and problem-solving skills with attention to detail and curiosity for continuous learning
* Effective communication and documentation skills in English, both written and verbal
* Experience collaborating across teams (e.g., Security Engineering, Incident Response, Application Security) on detection improvements or automation projects
* Prior experience in a Security Operations Center (SOC) or similar environment is highly preferred
* Familiarity with the fintech environment or experience supporting financial services infrastructure is considered a strong advantage
#LI-AS1
Gen is proud to be an equal-opportunity employer, committed to diversity and inclusivity. We base employment decisions on merit, experience, and business needs, without considering race, color, national origin, age, religion, sex, pregnancy, genetic information, disability, medical condition, marital status, sexual orientation, gender identity or expression, military or veteran status, or other unlawful factors. Gen prohibits discrimination based on these protected characteristics and recruits talented candidates from diverse backgrounds.
We consider individuals with arrest and conviction records and do not discriminate against employees for discussing their own pay or that of other employees or applicants. Learn more about pay transparency.
To conform to U.S. export control regulations, applicant should be eligible for any required authorizations from the U.S. Government.
$83k-118k yearly est. Auto-Apply 57d ago
Information Security Specialist
McCartney Hr
Cyber security analyst job in New York, NY
Information Security Specialist Job Responsibilities:
Safeguards information system assets by identifying and solving potential and actual security problems.
Information Security Specialist Job Duties:
Protects system by defining access privileges, control structures, and resources.
Recognizes problems by identifying abnormalities; reporting violations.
Implements security improvements by assessing current situation; evaluating trends; anticipating requirements.
Determines security violations and inefficiencies by conducting periodic audits.
Upgrades system by implementing and maintaining security controls.
Keeps users informed by preparing performance reports; communicating system status.
Maintains quality service by following organization standards.
Maintains technical knowledge by attending educational workshops; reviewing publications.
Contributes to team effort by accomplishing related results as needed.
Information Security Specialist Skills and Qualifications:
System Administration, Network Security, Problem Solving, Information Security Policies, Informing Others, Process Improvement, On\-Call, Network Troubleshooting, Firewall Administration, Network Protocols, Routers, Hubs, and Switches. "}}],"is Mobile":false,"iframe":"true","job Type":"Full time","apply Name":"Apply Now","zsoid":"641401441","FontFamily":"Verdana, Geneva, sans\-serif","job OtherDetails":[{"field Label":"Industry","uitype":2,"value":"Technology"},{"field Label":"City","uitype":1,"value":"Brooklyn"},{"field Label":"State\/Province","uitype":1,"value":"New York"}],"header Name":"Information Security Specialist","widget Id":"**********00072311","is JobBoard":"false","user Id":"**********00133003","attach Arr":[],"custom Template":"3","is CandidateLoginEnabled":true,"job Id":"**********00267067","FontSize":"12","location":"Brooklyn","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do","logo Id":"2qf78d018cc5be94b40bbbcb719566377b192"}
$83k-118k yearly est. 60d+ ago
Information Security Analyst
Res Servicing Corp
Cyber security analyst job in New York
Position Overview: The Information SecurityAnalyst plays a crucial role in safeguarding an organization's sensitive data, systems, and networks from potential cyber threats and attacks. This role involves monitoring, analyzing, and responding to security incidents, as well as implementing proactive measures to mitigate risks and ensure compliance with industry standards and HIPAA/HITECH regulations.
Responsibilities:
Monitoring and Incident Response:
Monitor network traffic, system logs, and security alerts to identify and investigate potential security incidents.
Analyze and respond to security breaches, malware infections, and other cyber threats promptly.
Collaborate with cross-functional teams to contain and mitigate security incidents effectively.
Vulnerability Assessment and Management:
Conduct regular vulnerability assessments to identify weaknesses in the organization's systems, networks, and applications.
Implement patches and updates to address vulnerabilities, ensuring systems are up to date and secure.
Security Policies and Procedures:
Develop and maintain information security policies, standards, and procedures.
Educate employees on security best practices and ensure adherence to established security policies.
Security Audits and Compliance:
Participate in internal and external security audits, ensuring compliance with regulatory requirements and industry standards.
Prepare and provide documentation for audit purposes.
Security Tools and Technologies:
Manage and maintain security tools such as firewalls, intrusion detection systems, anti-virus software, and encryption technologies.
Research and recommend new security technologies and solutions to enhance the organization's security posture.
Threat Intelligence:
Stay current with emerging threats, vulnerabilities, and security trends.
Utilize threat intelligence sources to proactively identify and mitigate potential risks.
Incident Documentation and Reporting:
Document incident details, analysis, and response actions in a clear and organized manner.
Provide regular and ad-hoc security reports to management, highlighting key findings and recommendations.
Security Awareness and Training:
Organize security training and awareness programs for employees to promote a culture of security consciousness.
Our Benefits
Medical, and Dental & Vision (optional)
401(K) with employer match
Paid Parental Leave policy
$83k-117k yearly est. 60d+ ago
Information Security Analyst
Public Health Solutions 4.7
Cyber security analyst job in New York, NY
Public Health Solutions (PHS) is a 501(c)3 non-profit community-based organization (CBO) that has existed for 70 years to improve health equity and address health-related social needs (HRSN) for historically underserved marginalized communities. As the largest public health nonprofit serving New York City, we improve health outcomes and help communities thrive by providing services directly to vulnerable families, supporting community-based organizations through our long-standing public-private partnerships, and bridging the gap between healthcare and community services. We focus on a wide range of public health issues including food and nutrition, health insurance, maternal and child health, sexual and reproductive health, tobacco control, and HIV/AIDS. Learn more about our work at healthsolutions.org.
PHS administers WholeYouNYC (WYNYC), a coordinated community resource network that builds trustworthy and reliable pathways between healthcare providers, health plans and CBOs providing critical resources in the community that address the social drivers of health. WYNYC brings together over 100 organizations offering various programs - such as food, housing, employment, health insurance, and sexual health services - across all five boroughs. These services and programs make it possible for New Yorkers to live their healthiest lives and ultimately reduce health disparities and advance health equity. To date, our network has already impacted thousands of lives through community partnerships and referrals, generating millions in estimated healthcare savings.
New York State (NYS) recently announced the availability of $500M statewide to support Social Care Network (SCN) lead entities responsible for coordinating social care delivery in various regions across the state. Public Health Solutions (PHS) and our WYNYC network were awarded the role of regional SCN for Brooklyn, Manhattan, and Queens.
This is a grant-funded position ending March 31, 2027.
Program Description:
The Information SecurityAnalyst is responsible for supporting and maintaining the organization's information security and compliance program in accordance with applicable federal, state, and contractual requirements, including the NYS OHIP, Common Security Framework (CSF), and HIPAA Security practices.
This position plays a critical role in safeguarding organizational assets by monitoring information systems, evaluating security controls, and coordinating incident response activities. The Analyst will collaborate closely with internal IT resources, the managed Security Operations Center (SOC), and external partners to ensure adherence to established policies, standards, and regulatory obligations.
Key Responsibilities
Regulatory Compliance and Risk Management
Support and maintain compliance with OHIP PM-17 standards, NYS security requirements, HITRUST CSF, and HIPAA regulations.
Participate in internal and external security audits, assessments, and certification readiness efforts.
Document and maintain evidence of compliance activities, corrective action plans, and remediation tracking.
Assist in the periodic review and revision of information security policies, standards, and procedures.
Security Operations
Monitor and respond to alerts generated through the organization's SIEM and security monitoring platforms, in coordination with the SOC.
Investigate, triage, and document security incidents and vulnerabilities in accordance with established escalation protocols.
Prepare and distribute regular security and compliance reports to IT leadership.
Microsoft 365 and Azure Security
Administer and maintain controls within the Microsoft 365 Security & Compliance Center, including data loss prevention (DLP), auditing, retention, and threat protection.
Implement and review Azure Cloud security configurations, including conditional access, identity protection, and secure baselines.
Monitor privileged access and ensure adherence to least-privilege and separation-of-duties principles.
Coordination and Communication
Serve as a liaison with the SOC and external vendors for incident response, threat intelligence, and log management activities.
Collaborate with infrastructure, application, and compliance teams to align security practices with organizational objectives.
Qualifications and Experience:
Education: Associate or Bachelor's degree in IT, Computer Science, or related field or equivalent.
Experience: Minimum of one(1) to three (3) years of professional experience in information security, cybersecurity operations, or IT compliance.
Demonstrated knowledge of, NYS OHIP, and HIPAA compliance frameworks.
Proficiency with Microsoft 365 Security & Compliance Center, Azure Security Center, and Defender for Cloud.
Experience with SIEM platforms (e.g., Microsoft Sentinel, Splunk, LogRhythm) and associated reporting functions.
Familiarity with security incident response, vulnerability management, and risk assessment methodologies.
Strong written and verbal communication skills, with the ability to produce audit-ready documentation and reports
Desired Skills:
Professional certifications such as CompTIA Security+, CISSP, CCSK, Microsoft Certified: Security Operations Analyst Associate, or HITRUST CCSFP.
Prior experience supporting compliance efforts within a public health, nonprofit, or governmental organization.
Key Attributes for Success
Strong eagerness to learn and develop new technical skills.
A proactive and problem-solving mindset.
Attention to detail and ability to document IT processes clearly.
Ability to work both independently and collaboratively within an IT team.
Willingness to take on new challenges in a fast-paced IT environment.
Reports To:
Information Security Manager
Direct Reports:
This position has no direct reports
Benefits:
• Hybrid Work Schedule.
• Generous Paid Time Off and Holidays.
• An attractive and comprehensive benefits package including Medical, Dental and Vision.
• Flexible Spending Accounts and Commuter Benefits.
• Company Paid Life Insurance and Disability Coverage.
• 403(b) + employer matching and discretionary company contributions.
• College Savings Plan.
Ongoing training and continuous opportunities for professional growth and development.
At PHS, we place immense value on diversity within our teams, understanding that varied backgrounds and experiences significantly enhance our community and propel us toward our goals. If you find you don't have experience in all the areas listed above, we still encourage you to apply and share your background and experiences in your application. We are eager to discover how your unique perspective can bring positive transformations to our team and help advance our mission of creating healthier, more equitable communities.
We look forward to learning more about you!
PHS is proud to be an equal opportunity employer and encourages applications from women, people of color, persons with disabilities, LGBTQIA+ individuals, and veterans.
9am- 5pm
35 hours
$68k-96k yearly est. Auto-Apply 18d ago
Security Engineer, Operating Systems
Anthropic
Cyber security analyst job in New York, NY
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training.
This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale.
What You'll Do:
Design and implement hardened OS configurations for AI workloads across diverse hardware platforms
Minimize attack surfaces by removing as many unnecessary components as possible from kernelspace and userspace
Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms
Implement and maintain full-disk encryption solutions for diverse storage systems
Build security infrastructure for AI systems, research environments, and production services
Create OS-level attestation and integrity monitoring systems
Apply security patches, develop patches for custom kernel modules, and kernel hardening configurations
Design secure boot processes and trusted execution environments
Work with container teams to ensure proper workload isolation at the kernel level
Design privilege separation and mandatory access control policies
Implement secure update mechanisms for OS components
Build tooling for security configuration management and compliance verification
Serve as a subject matter expert for OS security questions and designs
Who You Are:
5+ years of experience in operating systems security or kernel development
Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.)
Experience with kernel hardening techniques and exploit mitigation
Strong programming skills in C and systems programming languages
Experience with eBPF for security monitoring and enforcement
Understanding of virtualization and containerization security
Track record of identifying and fixing OS-level security vulnerabilities
Experience with security-focused Linux distributions
Strong candidates may also have:
Kernel development experience or contributions to Linux kernel
Experience with real-time or embedded operating systems
Knowledge of hardware security features and their OS integration
Experience with secure boot technologies
Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX)
Background in vulnerability research, exploit development, or fuzzing
Experience with formal methods for OS verification
Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves)
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation.
Annual Salary:$300,000-$405,000 USDLogistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience.
Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
How much does a cyber security analyst earn in Rocky Point, NY?
The average cyber security analyst in Rocky Point, NY earns between $69,000 and $125,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Rocky Point, NY