Post job

Cyber security analyst jobs in Salt Lake City, UT

- 74 jobs
All
Cyber Security Analyst
Information Security Analyst
Information Security Engineer
Senior Security Engineer
Cyber Security Engineer
Network Security Analyst
Data Security Analyst
Senior Security Analyst
Information Systems Security Officer
Securities Analyst
Security Engineer
Security System Engineer
  • Cyber Security Engineer

    Blu Omega 4.1company rating

    Cyber security analyst job in Ogden, UT

    Blu Omega is looking for an experienced Cyber Security Engineer to support a highly secure Department of Defense customer in Ogden, UT. This position supports a major initiative focused on modernizing legacy network systems and transitioning mission services into an AWS-based cloud environment while maintaining strict DoD security compliance. Responsibilities: Design, implement, and maintain Secure Cloud Computing Architecture (SCCA) security controls, including Virtual Data Center Security Stack (VDSS) and Boundary Cloud Access Point (BCAP). Partner with DoD stakeholders to ensure cloud platforms comply with established security standards such as NIST 800-53, STIGs, and FedRAMP+. Enforce Trusted Cloud Credential Management (TCCM) policies to protect identity, authentication, and cloud credentials. Configure and manage cloud security monitoring, logging, and alerting solutions using tools such as SolarWinds, ELK, and cloud-native security services. Support the onboarding and migration of applications and systems into the cloud, ensuring security controls are properly applied throughout the transition. Collaborate with engineering and security teams to implement Zero Trust Architecture principles within cloud environments. Contribute to Authorization to Operate (ATO) activities by documenting security controls, mapping inherited controls, and supporting eMASS submissions. Provide technical leadership by advising on cloud security best practices and mentoring junior cybersecurity staff. Qualifications: Bachelor's degree in Computer Science, Cybersecurity, Information Systems, or a closely related discipline, or equivalent professional experience. CompTIA Security+ certification (required). Preferred DoD-recognized cloud security certifications such as AWS Certified Security - Specialty or Microsoft Azure Security Engineer. 7+ years of hands-on cloud security experience, with expertise in at least one major cloud service provider (AWS, Azure, or OCI). Demonstrated experience implementing and managing cloud security controls, including IAM, logging, monitoring, and compliance enforcement. Background in security incident response, vulnerability management, and cloud compliance assessments. Strong analytical, troubleshooting, and problem-solving skills within complex cloud environments. In-depth knowledge of DoD cloud security requirements, including NIST 800-53 controls, STIGs, and FedRAMP+ frameworks. Experience using automation and infrastructure-as-code tools such as Terraform, Ansible, and PowerShell to manage secure cloud configurations. Salary Range: $130,000 - $145,000 Our final salary offer will be based on several factors, including depth of technical skills, work experience, education, certifications, and clearance What Blu Omega Can Offer You: Competitive benefits including Health Insurance, 401K w/ match, Paid Time Off and more. Results driven culture that embrace our core values Rewarding work contributing to our Nation's mission critical programs Blu Omega is a Woman Owned Small Business Federal Technology services firm headquartered in Washington DC and supporting clients nationally. We provide Technology solutions for enterprise and government customers. Our team has a past performance in a diverse range of programs including those for Data Management, Cloud/Infrastructure, Software Development and Enterprise Applications. An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
    $130k-145k yearly 4d ago
  • Information Security Analyst

    Elementum Ai 4.1company rating

    Cyber security analyst job in Lehi, UT

    Who Is Elementum? Elementum is the innovative startup that's using AI Driven Workflows so that businesses can operate faster, smarter, and cheaper. Elementum's unique IP allows its platform to run natively inside its customers' own data clouds, enabling instant automation without any integrations or APIs. It's also fully pre-integrated with all of the leading public and private AI/ML/LLMs, making it the only choice for secure, AI-driven automation. Industry leaders like Sanofi, Under Armour, and Snowflake are using AI Driven Workflows to transform their operations to increase productivity, delight customers, and capture market share. Job Scope Elementum is looking for an experienced Information Security Analyst to join our team. This role is a key driver of Governance, Risk, and Compliance (GRC) efforts, responsible for implementing and maintaining the organization's security program, with a special focus on securing our AI-Driven Workflow platform and its native execution environment. The Information Security Analyst will interface directly with various teams and support security compliance efforts across the company and its products. This role reports to the company's Senior Audit Manager. What You'll Do Vendor Risk Management (VRM): Conduct thorough security assessments of third-party vendors, partners, and suppliers, particularly those providing AI/ML/LLM services or data cloud infrastructure, to identify potential risks and vulnerabilities. Risk & Compliance: Operate and enhance Elementum's risk management processes by conducting comprehensive risk assessments of the Elementum platform's native data cloud deployment model and developing supporting documentation. Collaborate closely with internal Engineering and Product teams to ensure the security and compliance of the AI-Driven Workflow features and the native execution environment. Engage with internal and external stakeholders to assess the functionality of key information security controls related to vendor or in-house developed software/systems. Analyze security reports, vulnerability scans, and other relevant data to make informed decisions and recommendations for improving the security posture of our platform. Manage security issues and tasks assigned to vendors to closure, actively reducing associated security risks. Complete detailed customer security and compliance questionnaires to offer assurance of Elementum's security posture regarding data cloud security, access control, and AI governance. Identify improvement opportunities and provide strategic feedback to senior team members and management regarding the evolving security landscape in the AI and Data Cloud space. Stay up-to-date with the latest security trends, vulnerabilities, and industry best practices related to LLM security, data cloud governance (e.g., Snowflake, Databricks, etc.), and data privacy regulations (GDPR, CCPA). Assist in the creation and maintenance of documentation related to third-party security assessments and internal compliance processes. You Should Have 2-3 years of experience in vendor risk, compliance, or security roles with hands-on experience in third-party security risk management. Strong familiarity with ISO 27001 and SOC 2 (given the enterprise focus), and some familiarity with other relevant security frameworks such as NIST CSF & 800-53, SOX, SOC1, HITRUST/HIPAA, GDPR, CCPA, GxP, etc. Demonstrable knowledge of or direct experience working with Cloud security and governance (AWS, Azure, GCP) and data cloud environments (Snowflake, Databricks). Bachelor's degree in an IT-related field, cyber security, or equivalent experience. 2+ years of project management experience, preferably involving security compliance initiatives. Experience in external or internal security audit/compliance activities. Strong knowledge of risk management methods, standards, processes, governance models, and industry-standard risk analysis approaches. Excellent written and verbal communication skills with the ability to present complex GRC and technical security information clearly to executives and customers. Ability to think both strategically and tactically in a high-energy, fast-paced environment. Proven ability to take ownership, self-motivate, and deliver results in ambiguous environments. Nice to Have Certifications: CRISC, CISA, or equivalent. Prior experience in a startup or high-growth company operating in the AI/ML or Data Cloud space. Understanding of working in regulated environments such as GDPR, CCPA, or HIPAA. Competitive Benefits Medical, dental, and vision coverage 401k matching Flexible vacation policy Engage with (and give high-fives to) senior management regularly Get in on the ground floor of a huge opportunity
    $71k-106k yearly est. 4d ago
  • Sentinel - Systems Security Engineer - 16416

    Northrop Grumman 4.7company rating

    Cyber security analyst job in Roy, UT

    RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: SecretTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. Join Northrop Grumman on our continued mission to push the boundaries of possible across land, sea, air, space, and cyberspace. Enjoy a culture where your voice is valued and start contributing to our team of passionate professionals providing real-life solutions to our world's biggest challenges. We take pride in creating purposeful work and allowing our employees to grow and achieve their goals every day by Defining Possible. With our competitive pay and comprehensive benefits, we have the right opportunities to fit your life and launch your career today. Northrop Grumman Defense Systems is seeking a Systems Security Engineer, (Level 2), that will support the Sentinel (GBSD) program performing Hardware Assurance. This position will be located in Roy, UT and will support the Ground Based Strategic Deterrent (GBSD) program. The Mission Defense Team (MDT) is seeking a highly motivated and qualified system engineer to serve as a Hardware Assurance Engineer, Level 2. You will be responsible for assessing and prioritizing a broad spectrum of hardware security threats. Key protection activities will involve vendor research, hardware assurance, program protection, counterfeit prevention, and supply chain security. Additional Responsibilities include: Assessment and analysis of threats, vulnerabilities, and risk for identified mission-critical functions and critical components Support courses of action based on knowledge and experience, initiative, guidance, and established regulations and policies Research, analyze data, and derive facts per identified vulnerabilities Participate in a variety of working groups and customer meetings; ensure communication of risk environment with stakeholders Contributes to program plans, goals, objectives, and milestones to for Hardware Assurance Review technical security assessments of SSE environments to identify points of vulnerability, non-compliance with established standards and regulations and recommended mitigation strategies Execute completion Statement of Work requirements, Program Milestone Exit Criteria, and program maturity commitments Ensure the architecture and design of systems are functional and secure; support the design, development, implementation, and integration of security systems and system components Self-starters compelled to take action in the workplace without requiring prompting from supervisors Support MDT with other duties as assigned In addition to technical skills, you will be a self-starter with strong time management skills. Your organizational skills and ability to anticipate future challenges will serve you well Basic Qualifications Must be a US Citizen with an active DoD Secret Clearance, at time of application, current and within scope, with an investigation date within the last 6 years Must have the ability to obtain and maintain Special Access Program (SAP) approval within a reasonable period of time, as determined by the company to meet its business need Requires a bachelor's degree in a STEM (Science, Technology, Engineering or Mathematics) discipline from an accredited university and 2 years of related experience; or a master's degree with 1 year Minimum 2 years of applying and understanding Systems Security Engineering principles applicable to US Government Defense Programs Minimum 2 years in showing the ability to communicate effectively and clearly present technical approaches and findings Experience in any of the full product life cycles of: ASIC Design, FPGA Design Experience in HDL (VHDL/Verilog), implementing designs using RTL Ability to show self as team player, able to multi-task, able to generate quality work products independently, able to make excellent judgement and show interpersonal skills Preferred Qualifications Degree in Aerospace Engineering, Systems Engineering, Mechanical Engineering, Software Engineering, or similar ICBM Experience Experience developing Systems Security Engineering requirements for hardware and software assurance Evaluating program processes and compliance strategies for large, complex multi-site programs Demonstrated experience and familiarity with vulnerability management Experience with Model-based Systems Engineering (MBSE) concepts and tools A solid understanding of Program Protection applicable to US Government Defense Programs and applied knowledge in the application of SSE principles across a broad spectrum of security measures (Cybersecurity, Counterfeit Awareness, Anti-Tamper, HW/SW Assurance, OPSEC, etc.) to protect critical program information (CPI) Top Secret clearance Position Benefits As a full-time employee of Northrop Grumman, you are eligible for our robust benefits package including: Medical, Dental & Vision coverage 401k Educational Assistance Life Insurance Employee Assistance Programs & Work/Life Solutions Paid Time Off Health & Wellness Resources Employee Discounts ****************************************************************** This position's standard work schedule is a 9/80. The 9/80 schedule allows employees who work a nine-hour day Monday through Thursday to take every other Friday off. This role may offer a competitive relocation assistance package. #Sentinelsystems Primary Level Salary Range: $77,200.00 - $115,800.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
    $77.2k-115.8k yearly Auto-Apply 56d ago
  • Data Security Analyst - C78843 7.5 Salt Lake City, Utah

    CapB Infotek

    Cyber security analyst job in Salt Lake City, UT

    We are looking for a Data Security Analyst for our long-term multiyear project out of Salt Lake City, Utah. Build software libraries and services to provide secure-by-default services to software engineering teams, including authentication systems, secure service architectures, endpoint control solutions, and cloud controls · Partner with colleagues from across engineering and risk to ensure an outstanding developer experience that satisfies the firm's security needs · Collaborate on feature design and problem solving · Help to provide frictionless integration with the firm's runtime, deployment and SDLC technologies · Manage the full lifecycle of software components, from requirements through design, testing, development, release and demise · Help to communicate and promote best practices for security engineering across the firm · Engage in production troubleshooting Basic Qualifications · A strong grounding in security concepts, including secure coding practices, trusted computing and principles of authentication and authorization · A good understanding of public key and symmetric key cryptography · The ability to reason about performance, security, and process interactions in complex distributed systems · Proficiency in designing, developing and testing cross-platform software in one or more of Java, Golang or C#; open to using multiple languages · Experience developing, deploying and supporting software across the full Continuous Delivery life-cycle · The ability to understand and effectively debug both new and existing software · Experience meeting demands for high availability, low latency and scale · The ability to communicate technical concepts effectively, both in writing and orally, as well as the interpersonal skills required to collaborate effectively with colleagues across diverse engineering teams Preferred Qualifications · An understanding of regulated environments, e.g. financial services · Experience building services using public cloud providers such as AWS, Azure or GCP · Experience with threat modeling and risk assessment · Experience of practical security engineering in a Linux and/or Windows environment · Familiarity with service mesh concepts and service-oriented architectures · Familiarity with data protection principles and solutions · Experience with deploying software to containerized environments - Kubernetes/Docker · Experience monitoring, measuring, auditing and supporting software · Scripting skills using Python, PowerShell or bash · Experience with Terraform or similar infrastructure-as-code platforms, as a user and/or as a service provider
    $69k-98k yearly est. 60d+ ago
  • Network Security Analyst

    Mindlance 4.6company rating

    Cyber security analyst job in Lehi, UT

    Mindlance is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at ************************* Job Description Job Title: Network Security Analyst Duration: 6 Months Location: Lehi, UT Required: • Minimum 3+ years exp. • Experience with implementing policy on firewalls (Juniper & Palo alto experience preferred) • Review requests for new firewall policy • Understanding of IP stack • Ability to prioritize work and meet defined SLAs • Good communication skills - both verbal and written Additional Information Thanks & Regards, ______________________________________________________________________________________________________ Vikram Bhalla | Team-Recruitment | Mindlance, Inc. | Office: **************
    $75k-95k yearly est. 15h ago
  • Cloud Cyber Security Engineer

    T-Rex Solutions 4.1company rating

    Cyber security analyst job in Ogden, UT

    T-Rex Solutions is seeking a qualified Cyber Security Engineer to support of a secure DOD customer located in Ogden, UT. The overall program that this role supports aims to modernize legacy network infrastructure and migrate services into a new AWS Cloud Environment. For any candidates not already local to the Ogden, UT area, T-Rex is offering a relocation support package to assist with moving costs. Responsibilities: Implement and manage Secure Cloud Computing Architecture (SCCA) controls, including Virtual Data Center Security Stack (VDSS) and Boundary Cloud Access Point (BCAP). Work with DoD teams to ensure cloud environments are compliant with DoD security frameworks, including NIST, STIGs, and FedRAMP+. Manage and enforce Trusted Cloud Credential Management (TCCM) practices for secure identity access and cloud credential management. Configure and maintain cloud security services for monitoring, alerting, and logging using tools like SolarWinds, ELK, and native CSP security features. Support cloud onboarding and migration, ensuring security best practices are adhered to during the transition. Collaborate with cross-functional teams to ensure Zero Trust principles are implemented effectively in the cloud environment. Assist in preparing and maintaining documentation for ATO processes, including mapping inherited controls and contributing to eMASS submissions. Provide guidance on cloud security best practices and mentor junior team members in cloud security management. Requirements: Bachelor's degree in Computer Science, Cybersecurity, Information Systems, or a related field (or equivalent experience). CompTIA Security+ 7+ years of experience in cloud security with hands-on experience in at least one CSP (OCI, Azure, or AWS). Experience in implementing and managing security controls in cloud environments, including identity and access management (IAM), logging, and monitoring. Experience with security incident management, vulnerability assessments, and cloud compliance processes. Strong troubleshooting and problem-solving skills in cloud environments. Solid understanding of DoD cloud security requirements, including NIST 800-53, STIGs, and FedRAMP+. Proficiency with automation tools such as Terraform, Ansible, and PowerShell for managing cloud configuration. Ability to obtain a DOD Secret clearance Desired: Secret Clearance or higher desired. DoD-approved cloud security certifications (e.g., AWS Certified Security Specialty, Microsoft Certified: Azure Security Engineer) preferred. T-Rex Overview Established in 1999, T-Rex Solutions, LLC is a proven mid-tier business providing data-centric mission services to the Federal government as it increasingly tries to secure and leverage the power of data. We design, integrate, secure, and deploy advanced technical solutions for our customers so they can efficiently fulfill their critical objectives. T-Rex offers both IT and professional services to numerous Federal agencies and is a leader in providing high quality and innovative solutions in the areas of Cloud and Infrastructure Services, Cyber Security, and Big Data Engineering. T-Rex is constantly seeking qualified people to join our growing team. We have built a broad client base through our devotion to delivering quality products and customer service, and to do that we need quality individuals. But more than that, we at T-Rex are committed to creating a culture that supports the development of every employee's personal and professional lives. T-Rex has made a commitment to maintain the status of an industry leader in compensation packages and benefits which includes competitive salaries, performance bonuses, training and educational reimbursement, Transamerica 401(k) and Cigna healthcare benefits. T-Rex is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, sex (including pregnancy and sexual orientation), parental status, national origin, age, disability, family medical history or genetic information, political affiliation, military service, or other non-merit based factors. In compliance with pay transparency guidelines, the annual base salary range for this position is $125,000 - $145,000. Please note that the salary information is a general guideline only. T-Rex considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/training, key skills, internal peer equity, as well as market and business considerations when extending an offer. T-Rex offers a diverse and collaborative work environment, exciting opportunities for professional growth, and generous benefits, including: PTO available to use immediately upon joining (prorated based on start date), paid parental leave, individual and family health, vision, and dental benefits, annual budget for training, professional development and tuition reimbursement, and a 401(k) plan with company match fully vested after 60 days of employment among other benefits.
    $125k-145k yearly Auto-Apply 5d ago
  • Sr. Security Analyst

    Lightspeed DMS

    Cyber security analyst job in South Jordan, UT

    Lightspeed is a leading provider of cloud-based software for dealerships and Original Equipment Manufacturers (OEMs), serving the Powersport, Marine, RV, Trailer, Outdoor Power Equipment, and Golf Cart industries. Lightspeed's Dealer Management Solution (DMS) enables dealerships to optimize their end-to-end business operations, including sales, parts, service, rentals, accounting, and Customer Relationship Management (CRM). When implemented into their daily operations, Lightspeed helps dealers increase their profitability by selling more units, service, and parts, all while creating a more streamlined experience for customers. For nearly 40 years, Lightspeed has been empowering 4,500+ dealers across North America with the tools and technology they need to manage their dealerships. The Senior Security Analyst is responsible for team lead activities, such as monitoring, analyzing, and responding to security incidents across enterprise systems, cloud environments, and networks. This role ensures the confidentiality, integrity, and availability of organizational information through proactive detection, incident response, and continuous improvement. The ideal candidate will have a strong technical background in leading threat analysis, SIEM integration and management, vulnerability management, and incident handling. What you'll do: Monitor and investigate security alerts and events across SIEM, EDR, and network systems. Conduct root cause analysis and coordinate remediation of security incidents. Lead vulnerability assessments and ensure timely patching and mitigation. Develop and maintain incident response playbooks and escalation procedures. Collaborate with IT, DevOps, and Development teams to strengthen overall security posture. Lead proactive threat hunting and continuous tuning of detection mechanisms. Support internal and external audits (e.g., SOC 2) and risk assessments by providing evidence and guidance. Perform firewall management, including rule changes, troubleshooting, and SOP development for hybrid cloud/on-prem environments. Lead to red/blue team exercises and implement findings to improve defenses. Coordinate and assist with enterprise pen-tests, risk assessments, and compliance initiatives. Serve as a lead security advisor to business and technical teams, providing guidance on secure design, risk mitigation, and compliance using industry frameworks and best practices. What you should have: Qualifications: Bachelor's degree in Cybersecurity, Information Technology, or a related field, or equivalent experience. 8+ years of experience in information security, incident response, or SOC operations. Proven hands-on experience with SIEM tools (Splunk, Sentinel, QRadar, etc.) and EDR/XDR platforms (CrowdStrike, Darktrace, Microsoft Defender). Strong experience securing and monitoring cloud environments (AWS, Azure). Deep knowledge of security frameworks (NIST CSF, ISO 27001, SOC 2). Advanced scripting and automation proficiency (Python, PowerShell, Terraform). Excellent analytical, problem-solving, and communication skills. Preferred Qualifications: Relevant certifications such as AWS Security, CISSP, GCIH, GCIA, GPEN, GWAPT preferred. Experience integrating AI and automation into security operations workflows. Hands-on experience performing dynamic application security testing and red team exercises across endpoint and cloud environments. Expert-level networking and firewall expertise with platforms such as Palo Alto, Cisco, or Checkpoint. Master's degree in Cybersecurity, Information Technology, or a related field. Inclusion and Diversity at Lightspeed: At Lightspeed, we celebrate the uniqueness of every individual and encourage diverse perspectives. We believe that inclusion drives innovation and fosters meaningful connections. We are committed to building an environment where everyone feels valued and empowered to make an impact. Equal Employment Opportunity Statement: Lightspeed is an Equal Opportunity Employer and is dedicated to building a diverse and inclusive workforce. All qualified applicants will be considered for employment without regard to race, color, creed, ancestry, national origin, gender, sexual orientation, gender identity, gender expression, marital status, religion, age, disability, veteran status, or any other protected category. Important Note: Applicants must be authorized to work in the U.S. Ready to apply? Take the next step in your career-apply today and join a team where your skills will make an impact!
    $90k-125k yearly est. Auto-Apply 1d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Salt Lake City, UT

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 34d ago
  • Senior Security Engineer

    Goodleap 4.6company rating

    Cyber security analyst job in Lehi, UT

    GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America. Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information. The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services. Your oversight will encompass: * Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. * Build-time controls: Managing applications/products security controls and activities during development. * Runtime controls: Overseeing security measures at runtime, from prevention to detection and response. Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed. While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities * Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes. * Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. * Support or develop components of the security analytics platform. * Contribute to investigations, threat hunting, and incident response activities in a supporting role. * Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns. * Support the security operations team with the vulnerability management lifecycle for products and services under your purview. * Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities. Required Skills, Knowledge & Abilities * Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences. * Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization. * Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments. * Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus). * Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble. * Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc. * Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases. * Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault. * Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed. * Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas. * Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments. * Experience engaging with vendors in design partnerships. * Experience overseeing vulnerability and threat management at the platform and application levels. * Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement. * Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution. $146,000 - $170,000 a year In addition to the above salary, this role may be eligible for a bonus. Additional Information Regarding Job Duties and s: Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law. If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today! We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI. We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $146k-170k yearly 60d+ ago
  • Information Systems Security Officer

    Mantech International Corporation 4.5company rating

    Cyber security analyst job in Clearfield, UT

    General information Requisition # R64695 Posting Date 12/10/2025 Security Clearance Required Top Secret Remote Type Onsite Time Type Full time Description & Requirements Shape the future of defense with MANTECH! Join a team dedicated to safeguarding our nation through advanced tech and innovative solutions. Since 1968, we've been a trusted partner to the Department of Defense, delivering cutting-edge projects that make a real impact. Dive into exciting opportunities in Cybersecurity, IT, Data Analytics and more. Propel your career forward and be part of something extraordinary. Your journey starts now-protect and innovate with MANTECH! MANTECH seeks a motivated, career and customer-oriented Information Systems Security Officer (ISSO) to join our Air Force / Space team at Hill AFB. The ISSO's primary function is to support the United States Air Force's 53rd Wing Technical Support Services (53rd WTSS) contract. Responsibilities include, but are not limited to: * Perform ISSO duties in support of in-house and external customers * Notify ISSM when changes occur that might affect the authorization determination of the information system(s) * Conduct periodic reviews of information systems to ensure compliance with the security authorization package * Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change * Ensure all IS security-related documentation is current and accessible to properly authorized individuals * Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans * Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them * Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries Minimum Qualifications: * Bachelor's degree in related discipline from an accredited college or university. 2 additional years of experience may be substituted for a degree. * 4+ years direct/related experience * Active / valid DoD 8570.01-M IAT-II certification * Experience with DoD/USAF information security policy background with practical / hands-on experience applying RMF processes and principles. * Experience developing and/or contributing to an RMF body of evidence composition, applicable artifacts, and associated control families. Clearance Requirements: * Active Top Secret Clearance * Must be able to obtain and maintain a DoD TS/SCI-eligible clearance (i.e. DCID 6/4 eligibility) * Eligibility for access to Special Access Program Information * Willingness to submit to a Polygraph. Physical Requirements: * Must be able to remain in a stationary position 50% * Needs to occasionally move about inside the office to access file cabinets, office machinery, etc. * Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer. * Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation. If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
    $64k-86k yearly est. Auto-Apply 14d ago
  • Information Security Analysts

    University of Utah 4.0company rating

    Cyber security analyst job in Salt Lake City, UT

    Bookmark this Posting Print Preview | Apply for this Job Please see Special Instructions for more details. About UIT: University Information Technology (UIT), the central IT service provider for the University of Utah, reports to the U's Chief Information Officer and is responsible for many of the U's shared IT services including the wired and wireless network; Campus Information Services (CIS) portal; UMail, telephone, and online collaboration; digital learning technologies; information security; software licensing; and a host of other IT systems and services. About the University of Utah: Located in Salt Lake City, the U is the flagship institution of the State of Utah's system of higher education, home to arts and museum venues and a member of the BIG-12 Conference. Skiing and snowboarding opportunities are a short distance from campus, and opportunities to pursue activities from biking to hiking to fishing abound. Salt Lake City is home to the Utah Symphony and Opera, Ballet West, professional sports teams, and a wide range of other cultural and recreational activities. The University of Utah offers a comprehensive benefits package for eligible employees including: * Excellent health, dental, and wellness coverage at affordable rates * 14.2% retirement contributions * Generous paid leave time * 11 paid holidays per year * 50% tuition reduction for employees after completing probationary period, and spouse, and dependent children after three years * Flex spending accounts * Free transit on most UTA services * Employee discounts on a variety of products and services including cell phones & plans, entertainment, health and fitness, restaurants, retail, and travel * Professional development opportunities * A wellness program to promote health and quality of life * Learn more about the great benefits of working for University of Utah: benefits.utah.edu For more information regarding how our salary and benefit offerings impact the overall compensation here at the University of Utah, please see our Total Compensation Calculator: ****************************************** Announcement Details Open Date 12/15/2025 Requisition Number PRN43780B Job Title Information Security Analysts Working Title Information Security Analysts Career Progression Track P00 Track Level P5 - Expert, P4 - Advanced, P3 - Career FLSA Code Computer Employee Patient Sensitive Job Code? No Standard Hours per Week 40 Full Time or Part Time? Full Time Shift Day Work Schedule Summary Monday - Friday, 8:00 AM - 5:00 PM. Some nights or weekends are possible based on a rotating on call shift. This is a hybrid position. VP Area President Department 00954 - UIT Systems & Security Location Campus City Salt Lake City, UT Type of Recruitment External Posting Pay Rate Range $88,000 - $131,300 Close Date 02/28/2026 Priority Review Date (Note - Posting may close at any time) Job Summary Information Security Analysts The incumbent will play a critical role in safeguarding regulated data across the enterprise by monitoring and analyzing the organization's data security posture. This position focuses on configuring Data Security Posture Management (DSPM) settings and policies, interpreting results, creating reports, identifying risks, and ensuring compliance. The analyst will take a risk-based approach to assess and remediate issues related to unauthorized storage or transmission of regulated data across cloud and on-premise environments. Learn more about the great benefits of working for University of Utah: benefits.utah.edu The department may choose to hire at any of the below job levels and associated pay rates based on their business need and budget. Responsibilities Data Security Monitoring * Review and analyze DSPM tool outputs to identify misconfigurations, unauthorized data flows, and storage of regulated data in non-approved locations. * Monitor the movement of sensitive data across cloud and on-prem systems, ensuring compliance with internal policies and regulatory requirements. Risk Assessment & Governance * Apply a risk-based methodology to prioritize remediation efforts. * Maintain applicable risk register entries and document findings for governance reporting. Collaboration * Partner with the Enterprise Security team to validate technical controls. * Work closely with the Chief Data Officer and Privacy Office to align DSPM findings with data governance and privacy requirements. Compliance & Policy Alignment * Ensure adherence to frameworks such as NIST CSF, CIS 18, and other applicable regulations (e.g., HIPAA, FERPA, etc. etc.). * Support audits and compliance reviews by providing DSPM-related evidence. Reporting & Communication * Prepare dashboards and reports for leadership summarizing DSPM findings, trends, and risk posture. * Communicate actionable insights to stakeholders in clear, business-focused language. Minimum Qualifications EQUIVALENCY STATEMENT: 1 year of higher education can be substituted for 1 year of directly related work experience (Example: bachelor's degree = 4 years of directly related work experience). Department may hire employee at one of the following job levels: Information Security Analyst, III: Requires a bachelor's (or equivalency) + 6 years or a master's (or equivalency) + 4 years of directly related work experience. Information Security Analyst, IV: Requires a bachelor's (or equivalency) + 8 years or a master's (or equivalency) + 6 years of directly related work experience. Information Security Analyst, V: Requires a bachelor's (or equivalency) + 10 years or a master's (or equivalency) + 8 years of directly related work experience. Preferences Certifications such as CISSP, CRISC, or equivalent. Master's degree in information security or another relevant field. Experience with a DSPM tool. 3+ years that are specifically tied to GRC experience. Type Benefited Staff Special Instructions Summary About UIT: University Information Technology (UIT), the central IT service provider for the University of Utah, reports to the U's Chief Information Officer and is responsible for many of the U's shared IT services including the wired and wireless network; Campus Information Services (CIS) portal; UMail, telephone, and online collaboration; digital learning technologies; information security; software licensing; and a host of other IT systems and services. About the University of Utah: Located in Salt Lake City, the U is the flagship institution of the State of Utah's system of higher education, home to arts and museum venues and a member of the BIG-12 Conference. Skiing and snowboarding opportunities are a short distance from campus, and opportunities to pursue activities from biking to hiking to fishing abound. Salt Lake City is home to the Utah Symphony and Opera, Ballet West, professional sports teams, and a wide range of other cultural and recreational activities. The University of Utah offers a comprehensive benefits package for eligible employees including: * Excellent health, dental, and wellness coverage at affordable rates * 14.2% retirement contributions * Generous paid leave time * 11 paid holidays per year * 50% tuition reduction for employees after completing probationary period, and spouse, and dependent children after three years * Flex spending accounts * Free transit on most UTA services * Employee discounts on a variety of products and services including cell phones & plans, entertainment, health and fitness, restaurants, retail, and travel * Professional development opportunities * A wellness program to promote health and quality of life * Learn more about the great benefits of working for University of Utah: benefits.utah.edu For more information regarding how our salary and benefit offerings impact the overall compensation here at the University of Utah, please see our Total Compensation Calculator: ****************************************** Additional Information The University of Utah values candidates who have experience working in settings with students from diverse backgrounds and possess a strong commitment to improving access to higher education for historically underrepresented students. Individuals from historically underrepresented groups, such as minorities, women, qualified persons with disabilities and protected veterans are encouraged to apply. Veterans' preference is extended to qualified applicants, upon request and consistent with University policy and Utah state law. Upon request, reasonable accommodations in the application process will be provided to individuals with disabilities. The University of Utah is an Affirmative Action/Equal Opportunity employer and does not discriminate based upon race, ethnicity, color, religion, national origin, age, disability, sex, sexual orientation, gender, gender identity, gender expression, pregnancy, pregnancy-related conditions, genetic information, or protected veteran's status. The University does not discriminate on the basis of sex in the education program or activity that it operates, as required by Title IX and 34 CFR part 106. The requirement not to discriminate in education programs or activities extends to admission and employment. Inquiries about the application of Title IX and its regulations may be referred to the Title IX Coordinator, to the Department of Education, Office for Civil Rights, or both. To request a reasonable accommodation for a disability or if you or someone you know has experienced discrimination or sexual misconduct including sexual harassment, you may contact the Director/Title IX Coordinator in the Office of Equal Opportunity and Affirmative Action: Director/ Title IX Coordinator Office of Equal Opportunity and Affirmative Action (OEO/AA) 383 University Street, Level 1 OEO Suite Salt Lake City, UT 84112 ************ ************ Online reports may be submitted at oeo.utah.edu For more information: *************************************** To inquire about this posting, email: ******************* or call ************. The University is a participating employer with Utah Retirement Systems ("URS"). Eligible new hires with prior URS service, may elect to enroll in URS if they make the election before they become eligible for retirement (usually the first day of work). Contact Human Resources at ************** for information. Individuals who previously retired and are receiving monthly retirement benefits from URS are subject to URS' post-retirement rules and restrictions. Please contact Utah Retirement Systems at ************** or ************** or University Human Resource Management at ************** if you have questions regarding the post-retirement rules. This position may require the successful completion of a criminal background check and/or drug screen. ************************************ This report includes statistics about criminal offenses, hate crimes, arrests and referrals for disciplinary action, and Violence Against Women Act offenses. They also provide information about safety and security-related services offered by the University of Utah. A paper copy can be obtained by request at the Department of Public Safety located at 1658 East 500 South. Posting Specific Questions Required fields are indicated with an asterisk (*). * * What is your highest level of completed education? * None * High School Diploma or Equivalent * Associate Degree * Bachelor's Degree * Master's Degree * Doctorate Degree * * How many years of related work experience do you have? * Less than 6 years * 6 years or more, but less than 9 years * 9 years or more, but less than 12 years * 12 years or more, but less than 15 years * 15 years or more Applicant Documents Required Documents * Resume * Cover Letter * List of References Optional Documents
    $88k-131.3k yearly Auto-Apply 8d ago
  • Information Security and Compliance Analyst

    Veracity Insurance

    Cyber security analyst job in Pleasant Grove, UT

    At Veracity, we aim to be a different kind of insurance partner - one that is free from outside investors, venture capital, or the pressures of a corporate parent. Ours is a culture of empowerment - one that believes in effort, results, and accountability. We believe that transparency fosters trust, trust fosters growth, and that growth drives innovation. Our commitment to rigorous evaluation and relentless execution lead to rapid evolution. We answer only to the small business owners we serve, and this independence allows us to stay focused on what matters most: helping their businesses thrive by providing expert guidance and best-in-class insurance policies. We're growing fast and want you to be a part of it! We're seeking a talented, detail-oriented Information Security and Compliance Analyst to join our team. Reporting to the Technical Operations and Information Security Manager, this role is responsible for supporting the organization's cybersecurity posture by maintaining and enhancing security policies, controls, and monitoring systems, and ensuring compliance with frameworks such as SOC 2 and PCI DSS to protect company and client data. Key Responsibilities Strengthen the organization's cybersecurity posture by implementing, maintaining, and improving security policies, standards, and technical controls Monitor security tools and system activity to identify, investigate, and escalate potential threats or vulnerabilities Support vulnerability management, including performing scans, tracking remediation, and validating fixes Maintain accurate, audit-ready documentation and coordinate evidence collection for SOC 2, PCI DSS, and other compliance frameworks Support incident response processes, including triage, documentation, and post-incident follow-up Assist with user access reviews, control testing, risk assessments, and security awareness efforts Collaborate with IT, Engineering, and Compliance teams on secure configurations, remediation plans, and cross-functional security initiatives Participate in routine policy, procedure, and control reviews to ensure alignment with regulatory requirements and security best practices Maintain detailed logs and reports of security activities, metrics, and compliance obligations Identify opportunities to strengthen controls, streamline processes, and enhance overall security program maturity Required to perform other duties as requested, directed, or assigned Requirements and Qualifications Bachelor's degree in information systems, IT, Cybersecurity, or a related field 2-3 years of experience in security compliance, auditing, or governance (SOC 2 experience preferred) Strong integrity, attention to detail, and accountability in handling sensitive or regulated information Proactive problem-solving skills with the ability to anticipate and address risks effectively Strong collaboration and communication skills with experience working across technical and compliance teams Ability to remain composed and effective under pressure, including during audits and security incident Perks Health, dental, and vision plans Amazing work-life balance with 4 weeks of Paid Time Off 10 Paid Company Holidays with 2 floating holidays 401K Programs with employer match Personal assistance programs for support in a healthy personal and work life Why Veracity? Here at Veracity, you'll be part of a team of trailblazers and visionaries. We're not just revolutionizing the way people “do” insurance; we are creating a whole new paradigm. Here, you will experience a vibrant and inclusive workplace where your ideas matter! With us, you have a chance to: Engage in groundbreaking projects that are reshaping the insurance landscape Collaborate with a group of dedicated, like-minded professionals Experience a culture that prioritizes growth and development Compensation Range: $75k/yr - $85k/yr We are proud to be an equal-opportunity employer. We are committed to providing equal opportunities to all qualified applicants, regardless of race, color, religion, sex, national origin, disability, or any other legally protected characteristics. If you need accommodation, please let us know during the interview process.
    $75k-85k yearly Auto-Apply 23d ago
  • Cloud Security Engineer

    Blu Omega 4.1company rating

    Cyber security analyst job in Ogden, UT

    We are seeking a qualified Cloud Security Engineer to support a secure DOD customer located in Ogden, UT. The overall program that this role supports aims to modernize legacy network infrastructure and migrate services into a new AWS Cloud Environment. Clearance Requirements: Candidates must have an interim secret clearance (or above) as a precondition of employment Location: Onsite 100% at Hill AFB, Ogden UT Responsibilities: Implement and manage Secure Cloud Computing Architecture (SCCA) controls, including Virtual Data Center Security Stack (VDSS) and Boundary Cloud Access Point (BCAP). Work with DoD teams to ensure cloud environments are compliant with DoD security frameworks, including NIST, STIGs, and FedRAMP+. Manage and enforce Trusted Cloud Credential Management (TCCM) practices for secure identity access and cloud credential management. Configure and maintain cloud security services for monitoring, alerting, and logging using tools like SolarWinds, ELK, and native CSP security features. Support cloud onboarding and migration, ensuring security best practices are adhered to during the transition. Collaborate with cross-functional teams to ensure Zero Trust principles are implemented effectively in the cloud environment. Assist in preparing and maintaining documentation for ATO processes, including mapping inherited controls and contributing to eMASS submissions. Provide guidance on cloud security best practices and mentor junior team members in cloud security management. Requirements: Bachelor's degree in Computer Science, Cybersecurity, Information Systems, or a related field (or equivalent experience). CompTIA Security+ (or higher IE CISM or CISSP etc) DoD-approved cloud security certifications (e.g., AWS Certified Security Specialty, Microsoft Certified: Azure Security Engineer) preferred. 7+ years of experience in cloud security with hands-on experience in at least one CSP (OCI, Azure, or AWS). Experience in implementing and managing security controls in cloud environments, including identity and access management (IAM), logging, and monitoring. Experience with security incident management, vulnerability assessments, and cloud compliance processes. Strong troubleshooting and problem-solving skills in cloud environments. Solid understanding of DoD cloud security requirements, including NIST 800-53, STIGs, and FedRAMP+. Proficiency with automation tools such as Terraform, Ansible, and PowerShell for managing cloud configuration. Interim Secret clearance or above What Blu Omega Can Offer You: Competitive benefits including Health Insurance, 401K w/ match, Paid Time Off and more. Results driven culture that embrace our core values Rewarding work contributing to our Nation's mission critical programs Blu Omega is a Woman Owned Small Business Federal Health Technology and Operations firm headquartered in Washington DC and supporting clients nationally. We provide Technology solutions for enterprise and government customers. Our team has a past performance in a diverse range of programs including those for Data Management, Cloud/Infrastructure, Software Development and Enterprise Applications. An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
    $74k-97k yearly est. 5d ago
  • Network Security Analyst

    Mindlance 4.6company rating

    Cyber security analyst job in Lehi, UT

    Mindlance is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at ************************* Job Description Job Title: Network Security Analyst Duration: 6 Months Location: Lehi, UT Required: • Minimum 3+ years exp. • Experience with implementing policy on firewalls (Juniper & Palo alto experience preferred) • Review requests for new firewall policy • Understanding of IP stack • Ability to prioritize work and meet defined SLAs • Good communication skills - both verbal and written Additional InformationThanks & Regards, ______________________________________________________________________________________________________ Vikram Bhalla | Team-Recruitment | Mindlance, Inc. | Office: **************
    $75k-95k yearly est. 60d+ ago
  • Sr. Security Analyst

    Lightspeed DMS

    Cyber security analyst job in South Jordan, UT

    Job Description Lightspeed is a leading provider of cloud-based software for dealerships and Original Equipment Manufacturers (OEMs), serving the Powersport, Marine, RV, Trailer, Outdoor Power Equipment, and Golf Cart industries. Lightspeed's Dealer Management Solution (DMS) enables dealerships to optimize their end-to-end business operations, including sales, parts, service, rentals, accounting, and Customer Relationship Management (CRM). When implemented into their daily operations, Lightspeed helps dealers increase their profitability by selling more units, service, and parts, all while creating a more streamlined experience for customers. For nearly 40 years, Lightspeed has been empowering 4,500+ dealers across North America with the tools and technology they need to manage their dealerships. The Senior Security Analyst is responsible for team lead activities, such as monitoring, analyzing, and responding to security incidents across enterprise systems, cloud environments, and networks. This role ensures the confidentiality, integrity, and availability of organizational information through proactive detection, incident response, and continuous improvement. The ideal candidate will have a strong technical background in leading threat analysis, SIEM integration and management, vulnerability management, and incident handling. What you'll do: Monitor and investigate security alerts and events across SIEM, EDR, and network systems. Conduct root cause analysis and coordinate remediation of security incidents. Lead vulnerability assessments and ensure timely patching and mitigation. Develop and maintain incident response playbooks and escalation procedures. Collaborate with IT, DevOps, and Development teams to strengthen overall security posture. Lead proactive threat hunting and continuous tuning of detection mechanisms. Support internal and external audits (e.g., SOC 2) and risk assessments by providing evidence and guidance. Perform firewall management, including rule changes, troubleshooting, and SOP development for hybrid cloud/on-prem environments. Lead to red/blue team exercises and implement findings to improve defenses. Coordinate and assist with enterprise pen-tests, risk assessments, and compliance initiatives. Serve as a lead security advisor to business and technical teams, providing guidance on secure design, risk mitigation, and compliance using industry frameworks and best practices. What you should have: Qualifications: Bachelor's degree in Cybersecurity, Information Technology, or a related field, or equivalent experience. 8+ years of experience in information security, incident response, or SOC operations. Proven hands-on experience with SIEM tools (Splunk, Sentinel, QRadar, etc.) and EDR/XDR platforms (CrowdStrike, Darktrace, Microsoft Defender). Strong experience securing and monitoring cloud environments (AWS, Azure). Deep knowledge of security frameworks (NIST CSF, ISO 27001, SOC 2). Advanced scripting and automation proficiency (Python, PowerShell, Terraform). Excellent analytical, problem-solving, and communication skills. Preferred Qualifications: Relevant certifications such as AWS Security, CISSP, GCIH, GCIA, GPEN, GWAPT preferred. Experience integrating AI and automation into security operations workflows. Hands-on experience performing dynamic application security testing and red team exercises across endpoint and cloud environments. Expert-level networking and firewall expertise with platforms such as Palo Alto, Cisco, or Checkpoint. Master's degree in Cybersecurity, Information Technology, or a related field. Inclusion and Diversity at Lightspeed: At Lightspeed, we celebrate the uniqueness of every individual and encourage diverse perspectives. We believe that inclusion drives innovation and fosters meaningful connections. We are committed to building an environment where everyone feels valued and empowered to make an impact. Equal Employment Opportunity Statement: Lightspeed is an Equal Opportunity Employer and is dedicated to building a diverse and inclusive workforce. All qualified applicants will be considered for employment without regard to race, color, creed, ancestry, national origin, gender, sexual orientation, gender identity, gender expression, marital status, religion, age, disability, veteran status, or any other protected category. Important Note: Applicants must be authorized to work in the U.S. Ready to apply? Take the next step in your career-apply today and join a team where your skills will make an impact!
    $90k-125k yearly est. 18d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Salt Lake City, UT

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 34d ago
  • Information Systems Security Officer

    Mantech 4.5company rating

    Cyber security analyst job in Clearfield, UT

    **MANTECH** seeks a motivated, career and customer-oriented **Information Systems Security Officer (ISSO)** to join our Air Force / Space team at **Hill AFB** . The ISSO's primary function is to support the United States Air Force's 53rd Wing Technical Support Services (53rd WTSS) contract. **Responsibilities include, but are not limited to:** + Perform ISSO duties in support of in-house and external customers + Notify ISSM when changes occur that might affect the authorization determination of the information system(s) + Conduct periodic reviews of information systems to ensure compliance with the security authorization package + Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change + Ensure all IS security-related documentation is current and accessible to properly authorized individuals + Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans + Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them + Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries **Minimum Qualifications:** + Bachelor's degree in related discipline from an accredited college or university. 2 additional years of experience may be substituted for a degree. + 4+ years direct/related experience + Active / valid DoD 8570.01-M IAT-II certification + Experience with DoD/USAF information security policy background with practical / hands-on experience applying RMF processes and principles. + Experience developing and/or contributing to an RMF body of evidence composition, applicable artifacts, and associated control families. **Clearance Requirements:** + Active Top Secret Clearance + Must be able to obtain and maintain a DoD TS/SCI-eligible clearance (i.e. DCID 6/4 eligibility) + Eligibility for access to Special Access Program Information + Willingness to submit to a Polygraph. **Physical Requirements:** + Must be able to remain in a stationary position 50% + Needs to occasionally move about inside the office to access file cabinets, office machinery, etc. + Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer. + Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation. If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
    $64k-86k yearly est. 14d ago
  • Senior Security Engineer

    Goodleap 4.6company rating

    Cyber security analyst job in Lehi, UT

    About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America. Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information. The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services. Your oversight will encompass: - Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. - Build-time controls: Managing applications/products security controls and activities during development. - Runtime controls: Overseeing security measures at runtime, from prevention to detection and response. Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed. While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes. Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. Support or develop components of the security analytics platform. Contribute to investigations, threat hunting, and incident response activities in a supporting role. Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns. Support the security operations team with the vulnerability management lifecycle for products and services under your purview. Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities. Required Skills, Knowledge & Abilities Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences. Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization. Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments. Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus). Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble. Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc. Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases. Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault. Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed. Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas. Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments. Experience engaging with vendors in design partnerships. Experience overseeing vulnerability and threat management at the platform and application levels. Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement. Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution. Additional Information Regarding Job Duties and s: Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law. If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today! We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI.
    $97k-121k yearly est. Auto-Apply 60d+ ago
  • Information Security Analysts

    The University of Utah 4.0company rating

    Cyber security analyst job in Salt Lake City, UT

    Information Security Analysts The incumbent will play a critical role in safeguarding regulated data across the enterprise by monitoring and analyzing the organization's data security posture. This position focuses on configuring Data Security Posture Management ( DSPM ) settings and policies, interpreting results, creating reports, identifying risks, and ensuring compliance. The analyst will take a risk-based approach to assess and remediate issues related to unauthorized storage or transmission of regulated data across cloud and on-premise environments. Learn more about the great benefits of working for University of Utah: benefits.utah.edu The department may choose to hire at any of the below job levels and associated pay rates based on their business need and budget. Responsibilities Data Security Monitoring -Review and analyze DSPM tool outputs to identify misconfigurations, unauthorized data flows, and storage of regulated data in non-approved locations. -Monitor the movement of sensitive data across cloud and on-prem systems, ensuring compliance with internal policies and regulatory requirements. Risk Assessment & Governance -Apply a risk-based methodology to prioritize remediation efforts. -Maintain applicable risk register entries and document findings for governance reporting. Collaboration -Partner with the Enterprise Security team to validate technical controls. -Work closely with the Chief Data Officer and Privacy Office to align DSPM findings with data governance and privacy requirements. Compliance & Policy Alignment -Ensure adherence to frameworks such as NIST CSF , CIS 18, and other applicable regulations (e.g., HIPAA , FERPA , etc. etc.). -Support audits and compliance reviews by providing DSPM -related evidence. Reporting & Communication -Prepare dashboards and reports for leadership summarizing DSPM findings, trends, and risk posture. -Communicate actionable insights to stakeholders in clear, business-focused language. Minimum Qualifications EQUIVALENCY STATEMENT : 1 year of higher education can be substituted for 1 year of directly related work experience (Example: bachelor's degree = 4 years of directly related work experience). Department may hire employee at one of the following job levels: Information Security Analyst, III : Requires a bachelor's (or equivalency) + 6 years or a master's (or equivalency) + 4 years of directly related work experience. Information Security Analyst, IV: Requires a bachelor's (or equivalency) + 8 years or a master's (or equivalency) + 6 years of directly related work experience. Information Security Analyst, V: Requires a bachelor's (or equivalency) + 10 years or a master's (or equivalency) + 8 years of directly related work experience.
    $50k-79k yearly est. 9d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Salt Lake City, UT

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 34d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Salt Lake City, UT?

The average cyber security analyst in Salt Lake City, UT earns between $52,000 and $96,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Salt Lake City, UT

$71,000
Job type you want
Full Time
Part Time
Internship
Temporary