Post job

Cyber security analyst jobs in Saint Joseph, MO

- 325 jobs
All
Cyber Security Analyst
Information Security Analyst
Information Security Engineer
Cyber Security Specialist
Senior Information Security Analyst
Senior Information Security Engineer
Security Engineer
Senior Security Engineer
Securities Analyst
Information Assurance Engineer
Network Security Consultant
Security Architect
Data Security Analyst
Information Assurance Analyst
Security System Engineer
  • Cyber Security (CISSP Certified)

    Global Connect Technologies 4.4company rating

    Cyber security analyst job in Omaha, NE

    Job Description & Skill Requirement: THE SECURITY ENGINEER IS RESPONSIBLE FOR IMPLEMENTING, MAINTAINING, MONITORING, AND MANAGING SECURE SOLUTIONS, WITH A FOCUS ON SECRETS MANAGEMENT AND PRIVILEGED ACCESS MANAGEMENT (PAM). TO BE SUCCESSFUL, THE CANDIDATE NEEDS TO HAVE PROFICIENCY WITH WINDOWS AND LINUX OPERATING SYSTEMS AND POSSESS THE ABILITY TO UNDERSTAND AND WRITE SCRIPTS OR APPLICATIONS USED TO AUTOMATE REPETITIVE TASKS. CANDIDATES SHOULD BE SELF-STARTERS, QUICK LEARNERS, AND OPEN TO CHALLENGING EXISTING PROCESSES. THIS POSITION REQUIRES EFFECTIVE COLLABORATION WITH TEAM MEMBERS TO TROUBLESHOOT ISSUES AND GATHER NEW REQUIREMENTS FROM THE TECHNOLOGY DEPARTMENT. GIVEN THE CONTINUOUSLY EVOLVING SECURITY LANDSCAPE, CANDIDATES WILL NEED TO CONTINUOUSLY LEARN, ADAPT, AND COLLABORATE. REQUIRED QUALIFICATIONS: BACHELORS DEGREE IN INFORMATION TECHNOLOGY, COMPUTER SCIENCE, OR A RELATED FIELD. TECHNICAL AND ANALYTICAL EXPERTISE WITH EXPERIENCE IN TECHNOLOGY DESIGN, IMPLEMENTATION, AND DELIVERY. WORKING KNOWLEDGE OF WINDOWS, LINUX, AND NETWORKS, INCLUDING TECHNIQUES FOR TROUBLESHOOTING, IDENTIFYING, AND SOLVING PROBLEMS. 5+ YEARS OF EXPERIENCE WITH WINDOWS AND/OR LINUX TROUBLESHOOTING. 5+ YEARS OF EXPERIENCE IN AN ENGINEERING ROLE. ABILITY TO THINK STRATEGICALLY AND TACTICALLY WITH EFFECTIVE DECISION-MAKING SKILLS. EXCELLENT WRITTEN AND VERBAL COMMUNICATION SKILLS. MUST BE FLEXIBLE AND ABLE TO HANDLE STRESSFUL SITUATIONS PROFESSIONALLY. DEMONSTRATED ABILITY TO WORK UNDER MINIMAL SUPERVISION. HIGH DEGREE OF SELF-MOTIVATION, COMMITMENT, AND INTEGRITY. ABILITY TO WORK WELL WITH OTHERS AND AS PART OF A TEAM. PREFERRED QUALIFICATIONS: CISSP OR OTHER SECURITY CERTIFICATION UNDERSTANDING OF PAM TOOLS AND PRODUCTS 3+ YEARS' EXPERIENCE IN A SECURITY ROLE PRIOR EXPERIENCE CREATING SCRIPTS OR APPLICATIONS TO ANALYZE DATA AND AUTOMATE PROCESSES
    $68k-94k yearly est. 22h ago
  • Cyber Security Specialist

    Robert Half 4.5company rating

    Cyber security analyst job in Cedar Rapids, IA

    We are seeking an IT Security Specialist to join our Clients team and play a key role in strengthening their cybersecurity posture. This position is focused on preemptive security measures, with an emphasis on vulnerability management and proactive risk mitigation. The ideal candidate is a hands-on professional who is developing their craft and eager to contribute to both the creation and maintenance of security improvements. Come join a great company as a IT Security Specialist! Apply now, call 319-362-8606, or email your resume direct to: Shawn M Troy - Technology Practice Director with Robert Half (email information is on LinkedIn). Key Responsibilities: Vulnerability Management: Identify, assess, and remediate vulnerabilities across on-premises and cloud environments. Collaborate with internal teams to ensure timely patching and risk reduction. Security Guidelines: Assist in developing new security policies and procedures. Maintain and update existing security documentation to align with best practices. Security Tools & Monitoring: Work with SIEM and endpoint protection tools, including Microsoft Defender, Microsoft Sentinel, and Arctic Wolf. Monitor alerts and assist in optimizing security tool configurations for better detection and prevention. Collaboration & Compliance: Support compliance initiatives and coordinate with other business units as needed. Participate in internal and external audits/risk assessments. Apply now, call 319-362-8606, or email your resume direct to: Shawn M Troy - Technology Practice Director with Robert Half (email information is on LinkedIn).
    $86k-120k yearly est. 4d ago
  • Azure Cloud Security Architect

    Prominent 4.2company rating

    Cyber security analyst job in Omaha, NE

    Prominent is looking for an Azure Cloud Security Architect for a contract to hire in Omaha, Nebraska. The successful Candidate will have senior level experience around design, build and deployment of technology initiatives to secure key government client's cloud environment. The selected candidate will be accountable for assisting in strategic planning and architecture and securing enterprise information by identifying network and application security requirements, implementing and testing security controls and procedures. Additionally, this role collaborates with other teams to embed security into the entire lifecycle, integrating DevSecOps principles and automation into the pipeline. No visa sponsorship is available for this opportunity! C2C or 1099 not available for this opportunity! Experience Required: 5+ years firsthand working with multiple Azure security tools and platforms such as Entra ID, Sentinel, Defender, Monitor, Key-Vault, or similar in other platforms. 5+ years managing security policies and initiatives in Azure. Identity Access and Management (IDAM) concepts, multifactor authentication, SSO/Federation Privileged Access Management (PAM) and Privileged Identity Management (PIM) key concepts Demonstrated ability to Define, Design, and configure the Azure security platforms, and function as an overall lead managing end to end security on the Azure GovCloud regions. Experience automating security baselines and policy enforcement in enterprise Azure environments. Experience automating “Policy-As-Code” using Terraform and ARM templates, with a focus on reusable module design, policy enforcement, and secure CI/CD integration. Demonstratable understanding of Information Security and Risk Management capabilities related to cloud computing across Windows and Linux, with demonstrated direct experience with the following domains: o Identity, Credential and Access Management (ICAM) o Authentication and Authorization including SSO and Identify Federation o Zero-Trust Model o Defense-In-Depth o Governance and Compliance o Securing Data o Securing the Operating System o Protecting the Network Layer o Continuous Diagnostics and Mitigation, Alerting, Audit Trail, and Incident Response o Cloud Core Platform: Compute, Storage, Networking Prior experience supporting federal, defense, or highly regulated commercial clients helpful along with the following skills: Familiarity with compliance frameworks such as FedRAMP, CMMC, FISMA and NIST 800-53. Certifications: CISSP, CCSP, Azure/AWS/Google Training and Certification Crowdstrike Falcon EDR for Azure Experience with secure baseline configurations (CIS Benchmarks, DISA STIGs) for Azure environments. Managing/maintaining FISMA compliance for a government information system in accordance with requirements from NIST. Demonstrated experience collaborating directly with external clients, business leadership, and auditors. Direct technical background, to include familiarity with servers, network devices, and security systems.
    $86k-125k yearly est. 4d ago
  • CI Cyber Threat Analyst

    GD Information Technology

    Cyber security analyst job in Springfield, MO

    Type of Requisition: Pipeline Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret/SCI Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Cybersecurity Operations, Cyber Threat Analysis, Security Operations, Threat Analysis Certifications: None Experience: 10 + years of related experience US Citizenship Required: Yes Job Description: Seize your opportunity to make a personal impact as a CI Cyber Threat Analyst supporting our intelligence customer. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career. At GDIT, people are our differentiator. As CI Cyber Threat Analyst, you will help ensure today is safe and tomorrow is smarter. Our work depends on a TS/SCI level cleared CI Cyber Threat Analyst joining our team to support our customer. Duties & Responsibilities: Produce weekly actionable Technical CI (Cyber/TSCM/TEMPEST) threat reports in collaboration with teammates, the customers partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly threat reports, each report due NLT 0800 each Monday morning. Threats reports will include (as applicable): Threat data collected and reported by the customers Technical CI team and network security personnel. Intelligence reported by the Intelligence Community. Fusion of all source threat analysis derived from multiple intelligence sources (INTS). Imagery when available. Information that can be used to inform security decisions. Produce monthly Technical CI threat reports in collaboration with teammates, the customers partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include: Compilation of data collected and reported in weekly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Imagery when available. Depiction of Technical CI threat (s) to inform security decision makers. Produce quarterly Technical CI threat reports in collaboration with teammates, the customers partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include: Compilation of data collected and reported in weekly and monthly products. Intelligence reported by the Intelligence Community. Fused all source threat analysis derived from multiple INTs. Include imagery when available. Depiction of Technical CI threat (s) to the customer to inform security decisions. Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, customer partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 December. Threat studies should include: Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products. Raw and finished Intelligence reported by the Intelligence Community. Fused all source threat analysis derived from multiple INTs. Include imagery when available. Analytic judgments, intelligence gaps, and overall technical threat(s) to the customer. Produce CI Information Reports and IIRs from data collected and reported by either the Technical CI team or the cyber security personnel. Provide a minimum of 6 Reports of Inquiry and/or Requests for Information within Fiscal year. Effective IIR writing requires: Coordination with teammates and stakeholders to ensure accuracy of reported information. Cross referencing local information reporting with Intelligence Community reporting. Clear and concise writing to briefly convey threat. Responsiveness to Intelligence Community priority collections requirements. Timeliness. Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE or Criss Cross). Provide Technical CI advice and expertise in support of CI inquiries, operations and issues. Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners. Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers. Provide high-quality, appropriate and objective conclusions from information in a timely manner. Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages. Provide current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats.) Self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards. Have proficiency in use of bottom-line-up-front (BLUF) writing. Collaborate well internally and externally with IC/Cyber community members. Coordinate CI Cyber activities originating from Enterprise Incident Response Events. Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other customer Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission. Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures. Skills and Experience: Required: 11+ years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations. Meet minimum training requirements, within one calendar year of assignment, for access to DoD networks in accordance with DoDM 8140.03, by attaining and maintaining at least baseline certification for DoDM 8140.03 Information Assurance Technician Level II compliance. Desired: Be a credentialed graduate of an accredited federal or DoD CI training academy. Bachelor's degree in Science, Technology, Engineering or Mathematics disciplines. Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines. Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov. Experience translating Government vision into understandable and achievable measures. Experience in using supervisory skills to coach teammates to achieve objectives Monitor and track progress towards achievable measures. Location: Customer Site Clearance: Active TS/SCI with ability to obtain CI Poly US Citizenship Required The likely salary range for this position is $137,700 - $186,300. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: None Telecommuting Options: Onsite Work Location: USA VA Springfield Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $137.7k-186.3k yearly Auto-Apply 60d+ ago
  • Cyber Security Training

    Kanshe Infotech

    Cyber security analyst job in Omaha, NE

    Kanshe Infotech - Houston, TX Kanshe Infotech is committed and noticed in the Information Technology industry as a company with exceptional talent and expertise in the area of software development and solutions. The company is formed by a group of people with extensive industry experience and wide ranging domain expertise with a vision to create a cost effective, high value solution provisions comparable to the big consulting companies. The mission of our company is to be an industry leader by offering innovative technology solutions that will give companies the edge to succeed in today's competitive environment.We work with large fortune 100 clients and are looking to add consultants to our team in the following technologies based on the career choice of the individual and also position with our clients. Job Description Our Training Features: · You will receive top quality instruction that is famous for Online IT training. · Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue. · Training sessions are conducted by real-time instructor with real-time examples. · Every training session is recorded and posted to the batch after each weekend class. · We are offering online training on Cyber Security. . Provide OPT Stem Ext.: Guidance and support for applying for the 24-month OPT STEM extension Help with OPT Employment letter: Help with drafting and obtaining OPT employment letters that meet USCIS requirements. · We provide training in technology of your choice. · Good online training virtual class room environment. · Highly qualified and experienced trainers. · Professional environment. · Special interview training · Training for skill enhancement. · Study material and Lab material provided. · E-Verified company. If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates. Thanks Additional Information No
    $69k-93k yearly est. 60d+ ago
  • CI Cyber Threat Analyst IV

    Techguard Security 3.6company rating

    Cyber security analyst job in Saint Louis, MO

    Assignment Overview: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted within established time frames. will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements: Duties: Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable): Threat data collected and reported by NGA Technical CI team and network security personnel. Intelligence reported by the Intelligence Community. Fusion of all source threat analysis derived from multiple intelligence sources (INTs). Imagery when available. Information that can be used to inform security decisions. Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include: Compilation of data collected and reported in weekly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decision makers. Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include: Compilation of data collected and reported in weekly and monthly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decisions. Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include: Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products. Raw and finished Intelligence reported by Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA. Produce IIRs from data collected and reported by either the Technical CI team, NGA cyber security personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires: Coordination with teammates and stakeholders to ensure accuracy of reported information. Cross referencing local information reporting with Intelligence Community reporting. Clear and concise writing to briefly convey threat. Responsiveness to Intelligence Community priority collections requirements. Timeliness. Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE, or Criss Cross). Provide Technical CI advise and expertise in support of CI inquiries, operations and issues. Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners. Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers. Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner. Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages. Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats). Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards. Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing. Display an ability to collaborate with internal NGA and external IC/Cyber community members. Coordinate CI Cyber activities originating from Enterprise Incident Response Events. Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission. Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures. Skills and Experience Required: Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations. Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level. Desired: Be a credentialed graduate of an accredited federal or DoD CI training academy. Possess a Bachelor's degree in Science, Technology, Engineering, or Mathematics disciplines. Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines. Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov. Experience translating Government vision into understandable and achievable measures. Experience in using supervisory skills to coach teammates to achieve objectives. Monitor and track progress toward achievable measures.
    $69k-91k yearly est. 60d+ ago
  • Cyber Security Service Defensive Cyber Operations Analyst (Government)

    Att

    Cyber security analyst job in Bellevue, NE

    This position requires office presence of a minimum of 5 days per week and is only located at customer's site. No relocation is offered. AT&T Global Public Sector is a trusted provider of secure, IP enabled, cloud-based, network solutions and professional services to the Federal Government. We are dedicated to recruiting, developing and empowering a diverse, high-performing workforce that is passionate about what they do, committed to our shared values and dedicated to our customers' mission. AT&T is hiring to support a US Government Program that provides IT Services to US Strategic Command located in Omaha Nebraska. Job Duties/Responsibilities: Monitor Cybersecurity Service Provider (CSSP) sensors to detect and investigate abnormal findings. Perform threat intelligence analysis and generate timely, actionable reports. Triage cybersecurity incidents and provide support for incident response activities. Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems, networks, databases, and web-based assets. Assist in the development of mission-critical technical documentation. Analyze and assess business impacts resulting from theft, destruction, alteration, or denial of access to information. Conduct regular security audits to ensure secure operation of systems and adherence to defined security policies and procedures. Ensure compliance with security policies and plans for data, software, hardware, and telecommunications. Perform shift work to provide continuous 7x24 coverage and cybersecurity support. Required Clearance: TS/SCI (#clearable) (#tssci) Additional Clearance Requirements: Can start with a TS (#topsecret) Required Qualifications: 15+ years of experience in cybersecurity engineering, management, and strategy for USAF and other DoD IT programs. At least one of the following certifications: GCIA, GCLD, GDSA, GICSP, CISSP-ISSAP, or CISSP-ISSEP. Desired Qualifications: ITIL v4 certification. Extensive hands-on experience with CSSP operations, sensor monitoring, and incident response. Deep knowledge of DoD and USAF cybersecurity frameworks, policies, and procedures. Strong background in threat intelligence analysis and reporting. Experience developing technical and mission-critical documentation. Advanced analytical skills to assess business impacts of cyber incidents. Demonstrated ability to conduct comprehensive security audits. Experience supporting 24/7 operations in a shift-based environment. Excellent communication and collaboration skills for cross-functional team environments. Proven ability to adhere to, and help evolve, cybersecurity policies and security plans. Our Cyber Security Service Defensive Cyber Operations Analyst's earn between $78,800 - $91,500. Not to mention all the other amazing rewards that working at AT&T offers. Individual starting salary within this range may depend on geography, experience, expertise, and education/training. Joining our team comes with amazing perks and benefits: Medical/Dental/Vision coverage 401(k) plan Tuition reimbursement program Paid Time Off and Holidays (based on date of hire, at least 23 days of vacation each year and 9 company-designated holidays) Paid Parental Leave Paid Caregiver Leave Additional sick leave beyond what state and local law require may be available but is unprotected Adoption Reimbursement Disability Benefits (short term and long term) Life and Accidental Death Insurance Supplemental benefit programs: critical illness/accident hospital indemnity/group legal Employee Assistance Programs (EAP) Extensive employee wellness programs Employee discounts up to 50% off on eligible AT&T mobility plans and accessories, AT&T internet (and fiber where available) and AT&T phone Weekly Hours: 40 Time Type: Regular Location: Bellevue, Nebraska It is the policy of AT&T to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, AT&T will provide reasonable accommodations for qualified individuals with disabilities. AT&T is a fair chance employer and does not initiate a background check until an offer is made.
    $78.8k-91.5k yearly Auto-Apply 46d ago
  • Cyber Security Analyst Tier 3

    Freedom Technology Solutions Group

    Cyber security analyst job in Saint Louis, MO

    Freedom Technology Solutions Groups is looking to add a Tier 3 Cyber Security Analyst to the team. The candidate will provide CSOC Tier 3 services, which is 24x7x365 coordination, execution, and implementation of all actions required for the containment, eradication, and recovery measures for events and incidents. CSOC Tier 3 services includes malware and implant analysis, and forensic artifact handling and analysis. When a CIRT is stood up, all contractors in support of CSOC Tier 3 services will be under the direct control of, and take direction from, the Government CIRT Commander. While not in a period of incident response, the Contractor shall conduct continuous exercises and dry runs to improve response outcomes in the event of a cyber-incident. All Contractor personnel performing CSOC Tier 3 services shall have or obtain, within six months of start, a certification that is compliant with DoDD 8140.01 and DoD 8570.01-M IAT Level III and CSSP Incident Responder. Job Duties: Coordinate and implement tasks, performing analysis, and building/documenting response activities required during cyber security incident response, to include but not limited to actions such as implementing containment measures, IP blocks, domain blocks, and disabling user accounts on direction of the Government. Coordinates with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter intelligence personnel as required to perform advanced investigation and triage of incidents; Collaborates with appropriate authorities in the production of security incident reports; Categorizes incidents and events; Coordinates with other contracts, organizations, activities, and other services as appropriate to ensure incidents are properly reported, contained, and eradicated; Coordinates with other contracts, organizations, activities, and other services as appropriate to de-conflict blue / red team activity with open incidents/events; Coordinates with other contracts, organizations, activities, and services to ensure NGA recovers from an incident/event; Builds timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions. Documents actions taken and analysis in the authorized ticketing system to a level of detail where the actions taken and analysis are capable of being systematically reconstructed. Develops and when approved by the Government generates and updates reports in the Joint Incident Management System (JIMS), Incident Case Management System (ICMS), and/or other authorized reporting systems as directed; Develops, maintains, sustains, and when properly authorized by the Government executes custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events; Performs digital media analysis on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis; Develops and identifies indicators of compromise to send to Cybersecurity stakeholders and other Contract Services; Provides adversary attribution; Performs malware analysis and signature development; Coordinate with CSOC Tier 1 and 2 services to remediate all discrepancies and provide recommendations to prevent reoccurrence. Job Requirements: Bachelors Degree and or 6 years' experience in Cyber Security (CSOS) Active security clearance. DoDD 8140.01 and DoD 8570.01-M IAT Level II and CSSP Incident Responder. Provides input to and coordinates with all applicable stakeholders to develop and deliver the daily CSOC Significant Activity Report, the daily CSOC Operations Update, and the Weekly CSOC Status Report; Serve as C-IRT members as required and serve under the direct control of, and take direction from, the Government C-IRT Commander; Develop and coordinate courses of action with various Government and contract stakeholders, and when properly authorized by the Government, execute Defensive Cyberspace Operations-Internal Defensive Measures on behalf of the NGA on NGA networks and systems; Performs digital media analysis and malware reverse engineering on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis. When properly authorized by the Government, execute custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events; Develops, documents, and provides to the Government incident investigation reports which include sufficient information to document the entire lifecycle of the incident and the response, including but not limited to adversary and friendly forces activity, host and network analysis, timelines, and recommendations for corrective actions, recommendations for new Tactics, Techniques, and Procedures (TTP) and other recommendations as appropriate, within 30 days of C-IRT stand-down; Conduct Quality Control reviews of a percentage closed CSOC Tier 2 tickets each week to ensure proper analysis, categorization, documentation, and notification Preferred Qualifications: Masters degree IAT III Qualifications that are nice to have: Juniper certification What's in It for You? Flexible work environment A team mentality - work with friendly, like-minded professionals Work with innovative, cutting edge technologies Enjoy extremely competitive compensation and benefits A work-life balance you can count on Opportunities to grow and advance your career on our dime The Benefits You Get with Freedom Amazing benefits including matching 401k, fully paid medical, and more Generous paid time off - including paid site closure days Competitive salary offerings Paid training and tuition reimbursement Referral bonuses Fully paid life and disability Annual logo wear allowance Company sponsored events (game nights, holiday party, summer party, happy hours) Interested in learning more about Freedom and our culture? Contact us today! We're constantly hosting hiring events in our office and elsewhere, to help you get a sense of what life is like at Freedom before joining the team. As an Equal Opportunity Employer, we do not discriminate on the basis of race, color, religion, sex, age, marital status, disability or veteran status Applicant Federal & E-Verify Postings VEVRAA Federal Contractor Accessibility: If you need an accommodation as part of the employment process, please contact Human Resources at Phone: ************ Email: ********************* Equal Opportunity Employer, including disabled and veterans. If you want to view the EEO Law poster, please choose your language: English - Spanish - Arabic - Chinese If you want to view the EEO Law Supplement poster, please choose your language: English - Spanish - Chinese If you want to view the Pay Transparency Policy Statement, please click the link: English
    $66k-89k yearly est. Auto-Apply 60d+ ago
  • Information Security Specialist

    Federal Reserve Bank of San Francisco 4.7company rating

    Cyber security analyst job in Kansas City, MO

    CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future. This role is responsible for modernizing the methods and procedures for performing cybersecurity risk management and assessing cybersecurity risk. This involves assessing the current approach, data, and tools to identify gaps and enhancements. It requires strong partnerships with key stakeholders and business leaders, conveying cyber risk to them in a way that allows them to make risk informed decisions and improve the Organization's security posture. Important Information Open to US Citizens, Green Card holders or Permanent Residents with at least 3 years of residency. No sponsorship is available. Candidates must have valid work authorization, without an end date to be considered. No H1-B, OPT, STEM OPT, CPT, TN, J-1, etc. This position requires working on-site with 5 days per month remote work flexibility. Key Activities Risk Assessment & Analysis Modernize the current approach to cybersecurity risk management and assessments. Research and evaluate methodologies and frameworks and subsequently apply them for use in the organization. Identify and implement risk quantification and scoring approaches within the organization. Perform in-depth data analysis to identify patterns, trends, and areas of focus and priority. Incorporate threat intelligence into risk assessments to provide context-aware risk evaluations. Conduct business impact analyses to understand how security incidents affect critical business functions. Evaluate and quantify risks associated with third-party vendors and supply chain. Assess specific risks related to cloud environments and services. Program Development Develop reports and dashboards to illustrate the organization's risk posture. Ensure that cybersecurity risk is integrated with IT risk, and informs overall Enterprise risk. Research and identify options to establish a risk register. Develop and track risk treatment plans including mitigation strategies, acceptance justifications, or transfer options. Map cybersecurity risks to relevant regulatory requirements and compliance frameworks. Continuously improve risk management processes based on industry trends and organizational needs. Communication & Collaboration Meet with technical experts and business leaders to convey cybersecurity risk in a way they can understand. Partner with incident response teams to incorporate lessons learned into risk models. Translate complex technical risk scenarios into actionable insights for all levels of the organization. Qualifications Experience Typically requires at least 6 years of relevant cybersecurity risk management experience. Experience with risk scoring methods and risk quantification. Experience with generating reports and dashboards to convey cybersecurity risk in a way that is easy to consume. Experience establishing or running an Enterprise cybersecurity risk management program. Experience with NIST SP 800-53 security standards. Experience presenting risk information to executive leadership. Education & Certifications Bachelor's degree specializing in an information technology field from an accredited college or university, or equivalent combination of directly related education and/or experience. Information Security industry certification (SSCP, CISSP, GIAC, CISM, CISA, etc.) preferred. Technical Knowledge Strong knowledge of and experience applying cybersecurity risk frameworks and assessment methodologies; examples may include Factor Analysis of Information Risk (FAIR), NIST Cybersecurity Framework (CSF). Strong skills and experience with data analysis. Experience with GRC (Governance, Risk, and Compliance) tools. Knowledge of business impact analysis methodologies. Familiarity with cloud security frameworks (CCSK, CCSP). Skills & Abilities Ability to understand technical details of cybersecurity risk. Ability to communicate complicated technical risk scenarios to all levels of the organization. Demonstrated self-motivation and ability to perform work independently, and also collaborate in a team environment. Additional Information How We Work (HWW): On-site: 5 days per month remote work flexibility Location: Kansas City, Denver, Oklahoma City, Omaha Remote Eligible: No Salary: $98,600 - $139,000 / Senior Level $117,300 - $165,400 / Advanced Level Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location. Screening: US Citizens or Green Card holders and Permanent Residents with at least 3 years of residency. This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and could take up to a couple of months to complete. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks. Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future. About Us Total Rewards & Benefits Who We Are What We Do Follow us on LinkedIn , Instagram, X (formerly Twitter) , and YouTube #KCFedIT Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America) The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences. Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels. Privacy Notice
    $117.3k-165.4k yearly Auto-Apply 17d ago
  • Cyber Security Risk & Compliance Analyst

    Kansas State University 3.9company rating

    Cyber security analyst job in Manhattan, KS

    The Cyber Security Risk & Compliance Analyst is responsible for assessing and managing cybersecurity risks across the university's IT environment while ensuring adherence to regulatory requirements, industry standards, and institutional security p... * 520805 * Manhattan, Kansas, United States * Division of Info Tech * Staff Full Time (Unclassified - Regular) * Closing on: Jan 31 2026 * On-site Add to favorites Favorited View favorites About This Role The Cyber Security Risk & Compliance Analyst is responsible for assessing and managing cybersecurity risks across the university's IT environment while ensuring adherence to regulatory requirements, industry standards, and institutional security policies. This position plays a key role in identifying vulnerabilities, conducting risk assessments, monitoring compliance controls, and providing actionable recommendations to strengthen the university's overall security and compliance posture. About Us The role is with the Security Incident Operations Center (SIOC) team and works to optimize detection capabilities, improve response, and maintain proactive threat response protocols. The security operations engineer ensures that the university's IT assets remain resilient against evolving security threats while delivering high-quality service to stakeholders across the institution. Worksite Description This position is On-site. What You'll Need to Succeed Minimum Qualifications: * Requires a bachelor's degree and two years of relevant experience Preferred Qualifications: * 3-5 years of experience in compliance, audit, or risk management * Strong knowledge of regulatory frameworks and standards * Experience with GRC platforms * Understanding of risk assessment methodologies * Excellent written and verbal communication skills * Experience with audit processes and evidence collection * Knowledge of cybersecurity frameworks (NIST, ISO 27001) * Compliance or risk management certifications (CISA, CRISC, CISM) * Experience with specific industry regulations (FERPA, GLBA, PCI DSS, etc) * Knowledge of business process mapping and documentation * Experience with policy management systems * Understanding of legal and regulatory research Additional Role Information: * Occasional after-hours work for incident response or change management work in designated maintenance windows * Participation in on-call rotation (applicable positions) * Occasional travel required for training, conferences, or other events Sponsorship eligibility: Candidates must be legally authorized to work in the U.S. on an ongoing basis without sponsorship How to Apply Please submit the following documents: * Resume * Cover Letter * Three Professional References Application Window Applications close on: January 31, 2026 Anticipated Hiring Pay Range $61,591-$70,000 frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_2dca1e396ec8ae7afb704142b6b8ab6b" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/2dca1e396ec8ae7afb704142b6b8ab6b?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_1"> frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_c0d64716b16e90313d8327ce9bb0af04" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/c0d64716b16e90313d8327ce9bb0af04?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_3"> frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_7d751c6b5967126ac4d8c55b815f613b" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/7d751c6b5967126ac4d8c55b815f613b?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_5"> You may also be interested in Assistant Professor, Swine Nutrition Manhattan Animal Sciences & Industry Assistant/Associate Professor, Swine Manhattan Animal Sciences & Industry Infrastructure Security Engineer Manhattan Division of Info Tech Why Join Us: Kansas State University offers a supportive and inclusive community, dedicated to your professional growth. While specific benefits may vary by position, many roles come with comprehensive packages that support your well-being and work-life balance, including health and life insurance, retirement plans, and generous paid time off. To learn more about benefits that are available for various positions, visit our benefits overview page. Work Authorization: Applicants must be currently authorized to work in the United States at the time of employment. Equal Employment Opportunity: Kansas State University is an Equal Opportunity Employer. All applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity, age, national origin, disability or status as a protected veteran. Remote and Hybrid work options: Some positions are eligible for remote or hybrid working arrangements. An employee who is working in a remote or hybrid capacity for K-State must reside within the United States in order to comply with all federal and state laws, filings, or tax requirements. Remote and hybrid work arrangements are not available for anyone who resides in the state of Idaho. Background Screening Statement: Upon acceptance of a contingent offer of employment, a candidate may be subject to a background check per K-State's background check policy. Interview Preferences: Kansas State University honors interview preferences for qualified applicants who are veterans or individuals with disabilities. Eligible applicants who meet the minimum qualifications, submit all required application materials, and submit required preference documentation by the closing date on the job advertisement will be granted a first-level interview. The disability and veteran interview preferences do not apply to student employment positions, temporary positions, athletics positions, academic and administrative department heads*, positions that require licensure as a physician, and positions that require that the employee be admitted to practice law in Kansas. * Heads of Departments refers to any individual holding a primary leadership role responsible for the overall strategic direction, management and operational oversight of a recognized academic or administrative unit within the university. To learn more about interview preferences at K-State, please visit our interview preferences page. frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_b63d88fbc8447ba82fcff7e6eacf09b0" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/b63d88fbc8447ba82fcff7e6eacf09b0?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=3_0">
    $61.6k-70k yearly 3d ago
  • Cyber Resilience Specialist

    Slalom 4.6company rating

    Cyber security analyst job in Kansas City, MO

    Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. We are currently looking for a Senior Consultant or Principal level Security strategist with deep technical and functional expertise in Business Continuity and Disaster Recovery. What You'll Do * Lead and facilitate Business Impact Assessments (BIAs) across business units * Develop and update Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs) aligned to critical business functions and systems * Assess organizational risk and capability gaps related to crisis management, workforce continuity, and infrastructure resilience * Design tiered recovery strategies based on RTOs, RPOs, and MVC (Minimum Viable Company) principles * Coordinate and conduct tabletop exercises, test execution, and post-mortem reviews * Align BC/DR practices with enterprise risk management frameworks, compliance requirements (e.g., HIPAA, ISO 22301), and audit expectations * Support program governance, metrics, training, and awareness efforts What You'll Bring * 6+ years of experience in Business Continuity, Disaster Recovery, or operational resilience consulting * Strong working knowledge of BIAs, BCP/DRP development, and crisis management planning * Understanding of IT infrastructure concepts and DR technologies (e.g., backup systems, cloud platforms) * Experience supporting risk assessments and regulatory audits * Excellent facilitation and stakeholder management skills * Strong writing skills to produce clear, client-ready plans and reports About Us Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all. Compensation and Benefits Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance. Slalom is committed to fair and equitable compensation practices. For this role, we are hiring at the following levels and targeted base pay salary ranges: The targeted base salary pay range for Senior Consultant in New Jersey, New York City, and Washington DC is $153,000 to $186,000. The targeted base salary range for Senior Consultant in Atlanta, Chicago, Detroit, Kansas City, Minneapolis, Nashville, Philadelphia, Phoenix, St. Louis is $140,000 to $171,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time. We are committed to pay transparency and compliance with applicable laws. If you have questions or concerns about the pay range or other compensation information in this posting, please contact us at: ********************. EEO and Accommodations Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process. #LI-MS12
    $153k-186k yearly Easy Apply 7d ago
  • Network Security Analyst

    Sa Technologies Inc. 4.6company rating

    Cyber security analyst job in Wichita, KS

    SA Technologies Inc. (****************** is a market leader and one of the fastest growing IT consulting firms with operations in US, Canada, Mexico & India. SAT is an Oracle Gold Partner, SAP Services Partner & IBM Certified enterprise. We guarantee you the best rate for your skills and performance. Job Description Position: Network Security Analyst( Citizens and Authorised to work in the US only) Location: Wichita, KS (Locals preferred) Employment: Contract to hire/Full time Salary - DOE Job Functions Resolve trouble tickets and respond to alerts generated by monitoring systems Design and implement network and security solutions Participate in cross-discipline troubleshooting for high visibility or complex issues Manage legacy WAN environment, and participate in the design and implementation of new customer-facing applications hosted via the internet Create and maintain documentation including: network diagrams, incident reports, audit remediation and runbooks Job Requirements Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background. At least 5 years' experience in information services, with demonstrated knowledge in complex multi-site LAN/WAN environment. 2 or more years of experience with: Switching and Routing, Firewall Support and Troubleshooting, Wireless Networking, Intrusion prevention. Relevant certifications are beneficial including: CISSP, CCSA, CCSE, CCNA, and CCNP Location: Local to Wichita, KS is preferred. Work on-site in Wichita, KS with minimum travel requirements Must have excellent communication skills. ***NO REMOTE WORK*** Qualifications Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background. Additional Information Shibu ************
    $61k-81k yearly est. 12h ago
  • Information Security Specialist

    Collabera 4.5company rating

    Cyber security analyst job in Saint Louis, MO

    Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers. Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations. For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US. Job Description Responsibilities: Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios. Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization Qualifications Required Skills/Experience • 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role • Knowledge of quantitative and qualitative risk evaluation methods • An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one • An ability to effectively influence others to modify their opinions, plans, or behaviors • An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business • Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part • An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization • Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement Additional Information To set up an inerview for this position, feel free to contact: Imran Malek ************ *******************************
    $71k-97k yearly est. Easy Apply 60d+ ago
  • Data Security Analyst

    The Timberline Group

    Cyber security analyst job in Saint Louis, MO

    Join our dynamic and thriving company as a Data Security Analyst in St. Louis, MO where you'll have the opportunity to make an impact and shape the future of our renowned brands. If you have a passion for fashion, eager to learn and have an eye for detail, this is the perfect role for you! As a member of our team, you'll be part of a company that values results, caring and learning. What You'll Be Doing Monitor security service performance and availability: Provide recommendations on security equipment, software, and services On-going investigation: Inspect information security alarms and events to determine vulnerability and impact Implement processes: Put forth structured risk assessment processes, conducting ongoing threat and vulnerability assessments, and evaluating controls and countermeasures to mitigate risk Participate in architecture reviews: Ensure adherence to information security architecture Develop processes: Create plans for preventing, detecting, identifying, analyzing and responding to information security incidents Design and deliver programs: Create education and training programs on information security and privacy matters The Timberline Group Phone: ************ PO Box 565, Sullivan, Mo 63080 ********************* ************************* "Delivering quality solutions through quality people"
    $64k-89k yearly est. Easy Apply 60d+ ago
  • Cyber Security Engineer

    CSA Global LLC 4.3company rating

    Cyber security analyst job in Beverly, KS

    Job DescriptionDescription: Client Solution Architects (CSA) is currently seeking a Cyber Security Engineer to support our program at Fort Leavenworth, KS. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions. How Role will make an impact: Maintains the appropriate operational security posture and documentation for MCTSP information systems Implementing DoD, Army, ARNG, and MCTSP information security policies Creating and implementing POA&M in response to vulnerabilities identified during risk assessments, audits, and inspections RMF document and artifact management Managing and tracking the IAVM system Physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and assistance in the development of security policies and procedures. Requirements: What you'll need to have to join our award-winning team: Clearance: Must possess and maintain an active Secret Clearance. Bachelor's degree in Cyber Security or related field or associate degree and 5 years of specialized experience. IAT II Certification 3 years' experience in assessing and mitigating risk for networks and systems utilized in LVC and integrated training environments that include simulations that stimulate Army C2 Systems. 3 years' experience planning architectures for LVC and integrated training environments and for stimulation of Army Mission Command Systems in support of Division and Above training events and distributed exercises; 5 years' experience with military training and training support; experience designing and supporting distributed, simulation-supported exercises Why You'll Love this Job: Purpose filled roles that contribute to impactful solutions to advance our federal clients' mission. You may examine doctrine, plans, policies and procedures that will enhance and enrich the training environment, ensuring our warfighters are fully prepared for any challenge. Daily opportunities to develop new skills Team environment What We Can Offer You: Compensation Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division. Diversity, Inclusion & Belonging We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. Benefits Healthcare (medical, dental, vision, prescription drugs) Pet Insurance 401(k) savings plan Paid Time Off (PTO) Holiday pay opportunities Basic life insurance AD&D insurance Company-paid Short-Term and Long-Term Disability Employee Assistance Program Tuition Support Options Identity Theft Program
    $77k-105k yearly est. 19d ago
  • Engineer, Information Security

    Mariner Wealth Advisors 4.4company rating

    Cyber security analyst job in Overland Park, KS

    We're seeking a proactive, detail-oriented Information Security Engineer to join our Technology and Information Security team. This role plays a critical part in protecting the integrity, confidentiality, and availability of our systems and data. You'll work hands-on with advanced security tools and collaborate across teams to ensure the firm's technology environment remains resilient and compliant. If you thrive on solving complex security challenges, driving continuous improvement, and safeguarding data in a fast-paced, highly regulated industry-this opportunity is for you. What You'll Do Implement, operate, and maintain enterprise-level information security tools and controls across the organization. Conduct security assessments and control testing to evaluate system performance and operational effectiveness. Support and mature core security processes, including: Malware response and remediation Vulnerability management and patch governance Security log analysis and monitoring Incident tracking, reporting, and documentation Analyze the security posture of new and existing applications, software, and infrastructure; provide actionable insights and recommendations. Collaborate with IT and business partners to identify risks, implement mitigations, and ensure security is embedded into technology and operational initiatives. Contribute to continuous improvement of the firm's Information Security Program through data analysis, reporting, and cross-functional input What You Bring Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related field-or equivalent experience. 3-5 years of professional experience in information security, IT operations, or a related technical field; experience in financial services a plus. Familiarity with security tools and frameworks (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001). Proven ability to operate with independence and accountability in a dynamic environment. Excellent communication and collaboration skills, with the ability to work effectively across teams and influence without authority. Analytical mindset with strong attention to detail, organization, and documentation discipline. Why Join Us We believe in giving associates progressive opportunities, actively nurturing professional growth, and giving back to the community. You'll find an environment that values curiosity, collaboration, and innovation-where your expertise contributes directly to protecting the firm and its clients. We're dedicated to building a diverse and inclusive culture where everyone has the support to reach their full potential. Our team enjoys a flexible, hybrid work environment that encourages both professional excellence and work-life balance. EOE/M/F/D/V
    $66k-91k yearly est. Auto-Apply 28d ago
  • Systems Engineer II - Secure Systems

    RTX

    Cyber security analyst job in Cedar Rapids, IA

    Country: United States of America Onsite U.S. Citizen, U.S. Person, or Immigration Status Requirements: The ability to obtain and maintain a U.S. government issued security clearance is required. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance Security Clearance: DoD Clearance: Secret Our nation's security depends on the sacrifice of the men and women who defend our country. For them to do this effectively, they need technology that keeps them a step ahead of their adversaries. This means providing secure yet technologically advanced equipment to our service personnel, fielded as quickly as possible. Our commitment is to do exactly that. This position is for a Systems Engineer II professional who will work onsite in our Cedar Rapids facility. Join the Mission Systems Secure Systems Department and help shape, define, and design communication solutions that connect militaries around the world! As a Systems Engineer, you will design and develop military products ensuring safe and protected communication. You will interface with multi-discipline engineering teams to create total system solutions, addressing both domestic and international customer needs. We are looking for talented individuals that love to problem solve and have a desire to grow and gain exposure to new skills. Our customers come from all different backgrounds, and so do our employees. If you're passionate about what you could accomplish here, we'd love to hear from you. What You Will Do Perform analysis, architecture and design at all levels of the total system product including concept, design, fabrication, modeling, test, installation, operation, maintenance and disposal. Perform functional analysis, trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications. Provide analysis for the decomposition of customer specifications and system level requirements into sub-system and piece part requirements, and develop verification criteria and plans for the requirements Perform technical planning, system integration, verification and validation, and supportability and effectiveness analyses for total system solutions. Perform daily tasks in a classified and controlled lab environment Travel up to 10% What You Will Learn You will gain Systems Engineering Requirements, Integration, Validation and Verification skills. You will be provided with mentorship opportunities to gain experience as a Systems Engineer You will obtain invaluable experience working with our radio subject matter experts in addition to security and crypto certification specialists, our customer base, and cross-functional integrated product team. You can take flight to becoming knowledgeable in security hardened products with exposure to the variety of business and products in an ever-evolving field. We are growing, so can you! Qualifications You Must Have Typically requires a degree in Science, Technology, Engineering or Mathematics (STEM) and minimum 2 years prior relevant experience or an Advanced Degree in a related field. The ability to obtain and maintain a U.S. government issued secret security clearance is required. Qualifications We Prefer Familiarity with the Scaled Agile framework Exceptionally strong communication skills, experience presenting technical data to program management and executive leadership Experienced with Cryptographic Hardware architecture/design, Network Encryption specifications and test methodologies Experience with tools such as DOORS, CAMEO or similar, Software Languages such as Rust and Python Experience with Model Based Systems Engineering What We Offer Benefits Some of our competitive benefits package includes: Medical, dental, and vision insurance Three weeks of vacation for newly hired employees Generous 401(k) plan that includes employer matching funds and separate employer retirement contribution, including a Lifetime Income Strategy option Tuition reimbursement program Student Loan Repayment Program Life insurance and disability coverage Optional coverages you can buy pet insurance, home and auto insurance, additional life and accident insurance, critical illness insurance, group legal, ID theft protection Birth, adoption, parental leave benefits Ovia Health, fertility, and family planning Adoption Assistance Autism Benefit Employee Assistance Plan, including up to 10 free counseling sessions Healthy You Incentives, wellness rewards program Doctor on Demand, virtual doctor visits Bright Horizons, child and elder care services Teladoc Medical Experts, second opinion program Eligible for relocation assistance And more! Eligible for relocation. Learn More & Apply Now! Do you want to be a part of something bigger? A team whose impact stretches across the world, and even beyond? At Collins Aerospace, our Mission Systems team helps civilian, military and government customers complete their most complex missions - whatever and wherever they may be. Our customers depend on us for intelligent and secure communications, missionized systems for specialized aircraft and spacecraft and collaborative space solutions. By joining our team, you'll have your own critical part to play in ensuring our customer succeeds today while anticipating their needs for tomorrow. Are you up for the challenge? Join our mission today. Role Type *Please ensure the role type (defined below) is appropriate for your needs before applying to this role. Onsite: Employees who are working in Onsite roles will work primarily onsite. This includes all production and maintenance employees, as they are essential to the development of our products. At Collins, the paths we pave together lead to limitless possibility. And the bonds we form - with our customers and with each other -- propel us all higher, again and again. Apply now and be part of the team that's redefining aerospace, every day. The salary range for this role is 66,000 USD - 130,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act. Privacy Policy and Terms: Click on this link to read the Policy and Terms
    $75k-103k yearly est. Auto-Apply 60d+ ago
  • Principal Information Security Engineer (Security Product Owner)

    Mastercard 4.7company rating

    Cyber security analyst job in OFallon, MO

    Our Purpose Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential. Title and Summary Principal Information Security Engineer (Security Product Owner) Who is Mastercard? Mastercard is a global technology company in the payments industry. Our mission is to connect and power an inclusive, digital economy that benefits everyone, everywhere by making transactions safe, simple, smart, and accessible. Using secure data and networks, partnerships and passion, our innovations and solutions help individuals, financial institutions, governments, and businesses realize their greatest potential. Our decency quotient, or DQ, drives our culture and everything we do inside and outside of our company. With connections across more than 210 countries and territories, we are building a sustainable world that unlocks priceless possibilities for all. Overview: The Security Threat & Response Management (STRM) program within Mastercard's Corporate Security organization is looking for a Security Product Owner to lead execution of our preventative security control strategy. The ideal candidate is driven, proactive about security, analytical, and brings strong technical cyber security expertise. This role is central to shaping and executing the roadmap and strategy for our program's primary security tools and defenses. We are looking for a technically proficient and forward-thinking professional who proactively monitors evolving security trends, modern modern defenses, and leverages advanced knowledge of security tools to foster innovation and strengthen resilience throughout our environments. Role * Define and drive the roadmap for the 'Defend' product, which covers preventative and detective security controls and configurations across dozens of security tools and platforms including SIEM, SOAR, DLP, Application Control, XDR, NGFW, UEBA, NDR, and more. * As the Defend product owner, you will be the team lead ensuring the Defend product feature team's work is prioritized, aligned to strategy, and properly road mapped. * Partner with stakeholders from engineering, endpoint, identity, and cloud teams to deploy and optimize security technologies and controls. * Translate security requirements, risk policies, and threat models into actionable work items and initiatives. * Lead capability assessments and recommend technologies aligned with business needs and program strategies. * Configure, integrate, and optimize security tools (e.g., EDR/XDR, NGFW, IDS, DLP, Application Control) in accordance with strategic objectives and initiatives. * Monitor control effectiveness and continuously tune policies to reduce friction and increase coverage. * Ensure alignment with internal standards, regulatory frameworks, and industry best practices. All About You The ideal candidate for this position should: * Be an advanced technical expert with hands-on experience across multiple SecOps teams and functions such as Security Operations Center, Security Engineering, Incident Response, Detection Engineering, Threat Hunting, and Insider Threat for a large, global enterprise. * Understand modern agile methodologies and how to define, assign, and track work for product feature teams and partner engineering teams. * Be skilled at translating complex security requirements into clear, actionable technical plans in accordance with relevant security strategies and objectives. * Be confident in how to approach complex security tooling and dependencies such as configuring access controls, tuning detection policies, and integrating tools into detection models and lifecycles. * Be a strong communicator, able to articulate vision and strategy to technical and non-technical stakeholders at all levels. Additional capabilities that will set you apart: * Experience with proactive security strategies and security technology products, platforms, and key technology. * Expertise in successfully integrating and leveraging threat intelligence data into security controls and tools for proactive, targeted security prevention. * Deep understanding of modern SecOps concepts and strategies such as 'SOC 3.0', posture management domains, attack surface reduction, adaptive protections, automated triage and response, zero trust, cloud-native security, etc. * Familiarity with regulatory compliance standards and frameworks (e.g., NIST, ISO, ATT&CK, D3FEND, PCI). * Ability to collaborate effectively with SOC, IR, Engineering, and other key stakeholders. * Passion for innovation and continuous improvement in security technology optimization. Corporate Security Responsibility: Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must: * Abide by Mastercard's security policies and practices; * Ensure the confidentiality and integrity of the information being accessed; * Report any suspected information security violation or breach; * Complete all periodic mandatory security training in accordance with Mastercard's guidelines. Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must: * Abide by Mastercard's security policies and practices; * Ensure the confidentiality and integrity of the information being accessed; * Report any suspected information security violation or breach, and * Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Pay Ranges O'Fallon, Missouri: $165,000 - $264,000 USD
    $62k-82k yearly est. Auto-Apply 43d ago
  • Information Security Compliance Analyst

    National Capitol Contracting 4.5company rating

    Cyber security analyst job in Offutt Air Force Base, NE

    This is a FULL-TIME, onsite position located in Omaha, NE. Active SECRET government security clearance required at the time of application. NCC is seeking an Information Security Compliance Specialist for an upcoming contract. Key Areas of Responsibility * Planning: Cyber Operational Readiness Assessment Planning (CORA) consisting of the following: * Testing and analysis of all applicable STIGs. * Scheduling and implementation of all applicable STIGs. * Monitoring and execution of the quarterly revalidation schedule. * Monitoring emerging changes to the applicable STIGs outside of the quarterly schedules. (CDRL A003). * Meeting Support: The contractor personnel shall support the following: (a) briefing 557 WW leadership on Cyber Security updates; (b) preparing biweekly Cyber Security Update meetings; (c) meeting with stakeholders to facilitate Cyber Security collaboration and (d) obtaining input from stakeholders to present to 557 WW leadership. (CDRL A002, A003, A005). * Monitoring the cybersecurity risk and threat to the 557 WW's cyber environment. * Assisting with the implementation plans for the 557 WW's transition to a cloud environment. Minimum Qualifications * Active Secret Government Security Clearance. * 5 years of relevant experience in Cyber Security and system accreditation. * Experience in the following: * Endpoint Security * Assured Compliance Assurance Solutions (ACAS) * Threat hunting and risk analysis * Intrusion Detection Systems * DISA STIGS * IAT Level II Certification Preferred Qualifications * Bachelors Degree in relevant field. NCC provides reasonable accommodations to qualified individuals with disabilities. If you are an applicant that requires a reasonable accommodation, please email us. Please reference the position in your email. NCC is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, ethnicity, ancestry, color, sex, religion, creed, age, national origin, citizenship status, disability, medical condition, military and veteran status, marital status, sexual orientation or perceived sexual orientation, gender, gender identity, and gender expression, familial status, political affiliation, genetic information, or any other legally protected status or characteristic. E-Verify Employer. VEVRAA Federal Contractor.
    $64k-92k yearly est. 60d+ ago
  • Information Security Analyst

    Mid American Credit Union 3.5company rating

    Cyber security analyst job in Wichita, KS

    Job DescriptionSalary: $24 About Us Credit Unions are not-for-profit organizations that exist to serve their members rather than to maximize profits. As a member-owned institution, our focus is on providing a safe place to save and borrow at reasonable rates! That is why our mission at Mid American Credit Union is to be the best choice for quality financial services, above and beyond all other alternatives. Who Should Apply Mid American Credit Union is looking for individuals that like to be challenged, rewarded and inspired! This job is perfect for self-motivated, quick thinkers with unmatched problem-solving skills. Are you ready to be a part of a team that provides outstanding service each and every day? What You'll Do As part of the IS team, the Information Security Analyst is responsible for assisting in on going reviews of IS systems and hardware to assure that regulatory requirements are met, and that all internal policies and procedures conform to regulatory levels. The Information Security Analyst is also responsible for assisting in the detection and remediation to third party audits, testing, and real time security vulnerabilities. The Information Security Analyst will also assist other members of the IS team and third-partyvendors in maintaining technology infrastructure and processing cycles in a manner that adheres to IS Compliance, IS Security, and IS performance standards. Operations IS Compliance and Cybersecurity Lead the completion of Mid American Credit Unions ongoing review of IS systems and procedures. Assist management to ensure information security policies and procedures conform to the appropriate regulatory level. Assist management by monitoring and advising on status of emerging trends in the industry and research potential security enhancements as directed by management. Third Party Audits and Testing Schedule and review periodic vulnerability and penetration test reports to track vulnerability and patch remediation efforts. Work with 3rd party vendors and IS staff to identify the appropriate mitigation action and remedies to reduce the risk to Mid American Credit Union information assets with minimal negative impact on the associated business processes. Investigate and report security violations of Mid American Credit Union Information Security policies and procedures Assist in Mid American Credit Unions annual Disaster Recovery testing and complete internal audits which include, but are not limited to, active directory reviews, internet logs, internal privileges, system access, media access, etc. Network Performance and Hardware Review hardware, software, and firmware technologies for possible security vulnerabilities that could impact the security of Mid American Credit Union assets. Provide trouble shooting and problem resolution for functional security and resolve security issues. User Support Respond to user requests for assistance in a timely, accurate and professional manner. Log all users requests in the Help Desk ticketing systems. Assist other team members with open tickets as needed. Perform any other duties as needed. Third Party Vendor, Training and Documentation Establish and maintain relationships that adhere to the credit union service standards with other Mid American Credit Union employees and third party vendors. Assist in the daily coordination and collaboration with third party vendors. Assist in IS security awareness and training efforts throughout the credit union. Assist in updating existing IS policies and procedures. Maintain all required documentation which includes, but not limited to; the ACET workbook, exam documentation, daily monitoring, vulnerabilities and remediation, audit test findings and remediation, incident response, change management, etc. Cultural Responsibilities Committed to being part of the Mid American team! Show commitment to learning and growth. Consistently demonstrate a positive attitude and strong people skills during interactions with co-workers and members. Be able to work individually as well as with a team. Embrace change and be able to think of new ideas to assist our members. Demonstrate financial responsibility and professionalism. What You Need to Get the Job Done Must be team oriented and possess a positive attitude while working well with others. Customer service experience including the ability to effectively perform the skills necessary to deliver exceptional service, such as communication, empathy, patience and organization. Education A 2-year college degree or completion of a specialized course of study at a business or trade school preferred. Experience 6 months to 2 years of similar or related experience, including time spent in preparatory positions. Working knowledge of front and back office financial institution processes is a plus. Understanding of networks and cyber security. Working knowledge relating to Microsoft server, exchange, and active directory preferred. A significant level of trust and diplomacy is required to be an effective subject matter expert in the position. In-depth dialogues, conversations and explanations with customers, direct and indirect reports and outside vendors of a sensitive and/or high confidential nature is a normal part of the day-to-day experience. Communications can involve motivating, influencing, educating and/or advising others on matters of significance. Must be able to work extended hours and/or travel off site when requested by management. 24x7 on call is required with on-site Saturday rotation duties. Must be able to perform job functions independently or with limited supervision and work effectively on own or as part of a team. Must be able to read and carry out various written instructions and follow oral instructions. Strong verbal and written communication skills. Strong organizational skills Ability to demonstrate a high degree of integrity, trust-worthiness, and maintain confidentiality of information and job-related data. Ability to prioritize multiple tasks and adjust to changing priorities, as well as, meet hard deadlines. What You'll Love About Us A Company that Cares.We are more than a financial institution; we give back to our community. We teach financial literacy and donate to and support local organizations. Work that Stays at Work.Genuine work/life balance served here! Rest and Relaxation. Paid vacation time, personal leave and paid holidays An Equal Opportunity Employer Mid American Credit Union is an Equal Opportunity Employers whose policy is not to discriminate unlawfully against any qualified employee or applicant for employment on the basis of protected military or veteran status, disability, race, color, religion, sex, age, national origin, pregnancy, genetic information, sexual orientation, gender identity, or any other classification protected by applicable local, state or federal law. Because our team members are trusted to handle sensitive information, we require all candidates who receive and accept employment offers to complete a background check before being hired. This Company Participates in E-Verify The Right to Work Este Empleador Participa en E-Verify El Derecho a Trabajar
    $24 hourly 4d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Saint Joseph, MO?

The average cyber security analyst in Saint Joseph, MO earns between $56,000 and $100,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Saint Joseph, MO

$75,000
Job type you want
Full Time
Part Time
Internship
Temporary