Cyber Security Analyst
Cyber security analyst job in Atlanta, GA
Orange Business is here! About us
Orange Business is a network and digital integrator that understands the entire value chain of the digital world, freeing our customers to focus on the strategic initiatives that shape their business. Every day, you will collaborate with a team dedicated to providing consistent, sustainable global solutions, no matter where our customers operate. With over 30,000 employees across Asia, the Americas, Africa, and Europe, we offer a dynamic environment to develop and perfect your skills in a field filled with exciting challenges and opportunities.
About the role
Orange Cyberdefense specializes in the design, implementation and support of the most reliable and innovative security solutions and services - we are seeking a SOC Analyst to join our global team for a major account.
As a SOC Analyst you are responsible for the detection, investigation and defense against cyber-attacks. In our SOC, you will work with security experts and use the latest technologies to analyze potential security incidents.
As the team is working based on FTS (follow-the-sun) model involving Brazil, France & Malaysia teams, shift work is required for this role.
Your key responsibilities as a SOC Analyst will include to:
Ensure that customer environments are always protected against cyber-attacks
Triage and investigate alarms generated by SIEM tools, endpoint protection tools, network anomaly detection tools, etc. by performing in-depth analysis
Undertake threat hunting investigations and campaigns
Escalate relevant threats to customers and providing advice based on these threats
Detect anomalies and attack patterns along the entire cyber-kill chain as described by MITRE ATT&CK
Support our customers during a security incident and ensure effective defense against attacks
Continuously develop improvements and detection methods to optimize detections
Report monthly on the status of customer environments
Advice customers on cyber trends.
About you
Cybersecurity needs to be your passion, securing the customers assets your mission. As security is often a tradeoff between different aspects, you need to be pragmatic and result driven to get your message delivered while reducing the risk for the customer.
Excellent English written/verbal and communication skills.
Minimum of 2 years of experience in a similar role
Experience using SIEM and/or EDR/XDR security tools - Knowledge in SPLUNK technology is a plus.
A degree in Computer Science, Cyber Security, Digital Forensics or Engineering - or equivalent industry recognized certification/experience
Ideally have experience with penetration testing, incident detection, incident response and malware analysis
Broad knowledge on threat analysis and experience in intelligence reporting.
Ideally have experience with penetration testing, incident detection, incident response and malware analysis.
Ideally have certifications such as CySA+, CEH, OSCP, OSDA, Splunk Power
Ideally have experience working within a SOC, if not then any experience within an IT Department providing customer support
Experience in reversing malware is a plus
Industry certifications like CISA, CISM, CISSP is a plus
What we offer
Our Competitive Benefits Package Includes:
Comprehensive health coverage (medical, dental, vision) for you and your family
Financial protection: life, disability, AD&D, and business travel insurance
401(k) plan with company match
Pre-tax savings through HSA and FSA accounts
Employee assistance program, tuition reimbursement, and adoption support
Healthy living and wellness reimbursements
Group-rate insurance options: home, auto, pet, and more
Generous PTO and paid volunteer days
Legal assistance, critical illness, hospital indemnity, and ID theft protection plans
Only your skills matter
Regardless of your age, gender identity, race, ethnic origin, religion/belief, sexual orientation, marital status, neuroatypia, disability, veteran status or appearance, we encourage diversity within our teams because it is a strength for the collective and a vector of innovation. Orange Group is a disabled-friendly company and equal opportunity employer: don't hesitate to tell us about your specific needs.
Auto-ApplyJunior Cyber Security Analyst
Cyber security analyst job in Atlanta, GA
Reliance
Worldwide
Corporation
Auto-ApplyCyber Security Analyst
Cyber security analyst job in Atlanta, GA
A Southern Company Security Analyst participates in monitoring, hunting and responding to cyber security events. He or She, provides a front-line role during cyber security incidents, identifying the extent of the threat, business impacts and advising or sometimes performing the most suitable course of action to contain, eradicate and remediate an incident. A Southern Company Security Analyst maintains a good knowledge of the threat landscape, helps enhance visibility and response capabilities by identifying new methods of detecting threats. A Southern Company Security Analyst is proactive and seeks out adversaries determined to negatively impact Southern Companies reputation, financial interest or threatens the safety of our employees and customers.
Candidates are expected to discuss and demonstrate they meet required qualifications for applicable roles.
Responsibilities
Take action on security events presented to Analyst via SIEM, user submissions, dashboards, etc.
Self-initiate hunting initiatives to discover potential breaches or undiscovered cyber threats
Remain abreast of emerging threat patterns and provide recommendations to detect threats
Assists with patching recommendations and workarounds for zero-day threats.
Coordinate mitigation or remediations task with stakeholders or supporting teams
Communicates with management on incident updates.
Monitors SIEM and analyzes security events to determine appropriate actions
Monitors emails containing links/attachments associated with potential phishing attempts to determine appropriate actions
Identify and tune false positives associated with current security events
Document analytical steps and findings associated with security event investigations
Qualifications Required for Cyber Security Analyst
2 years IT security experience
Minimum 2 years of experience in performing analysis on Windows and LINUX/UNIX systems
Minimum 2 years of experience and/or familiarity in the following areas:
Network/Endpoint: analysis tools
Scripting languages
Windows/Unix command line utilities
Reputation analysis associated with IP's, Domains, Email Addresses
Ticketing Systems
Required to submit to a background examination.
Experience operating within a security application such as Kali, Metasploit, and etc.
Familiar with and have worked within Cyber Security Frameworks such as:
NIST 800 - 61
Attack Life Cycle
SANS Security Controls
MITRE
SANS Security 500 Series or other industry standard equivalent
Experience with PCAP analysis
Experience investigating endpoint and network security events
Experience investigating user reported Phishing events (specifically investigating suspicious links and attachments)
Experience analyzing security events utilizing sandbox technology
Experience operating within a security application such as Kali, Metasploit, and etc.
Oral and written communication skills
Experience taking ownership of incidents from acknowledgement to resolution
Ability to identify and mitigate security events by recommending and/or implementing defensive/preventive strategies
Experience initiating security event investigations
Preferred capabilities:
Oral and written communication skills
Ability to take ownership of incidents from acknowledgement to resolution
Ability to initiate security event investigations
Ability to comprehend and articulate business impact associated with security events
Interacting with vendors to support proof of concepts
Proficient in Microsoft Office products: Excel, Word, Outlook and etc.
Exposure, experience and/or knowledge of cloud technology
Familiar with NIST 800-61 and SANS Critical Security Controls
Ability to identify and mitigate security events by recommending and/or implementing defensive/preventive strategies
Desired certifications:
GIAC Security Essentials (GCIH)
GIAC Certified Intrusion Analyst (GCIA)
Security+
Other certifications within IT Security
Characteristics of an Southern Company Cyber Analyst
Self-Motivated - Cyber Analysts do not only act when security tools trigger alerts, we are suspicious by nature and can generate security events based on self-initiated task.
Perseverance - Cyber Analysts identify resources that allow us to move through or around barriers as we analyze cyber security events.
Dependable - Cyber Analysts work within a team environment and thus, we rely on one another for knowledge-sharing and dependence.
Integrity - As Cyber Analysts, our reputation is our code of ethics. We are not perfect. We admit our mistakes. We do the right thing.
Sense of Humor - Although this may vary, just have one; I promise we can work with it. We have a lot of fun in what we do, so you will need a sense of humor to keep up.
This position falls under the company's Insider Threat Program and will have access to, and control over sensitive data, systems or assets. Enhanced personnel screening, which includes a background review, drug screen and psychological assessment, will be required if you are selected for this position
Auto-ApplyCyber Security Analyst
Cyber security analyst job in Atlanta, GA
Role Value Proposition:
The Incident Response Analyst will be a member of UpTime365's Global Cyber Incident Response Team. In this role, an analyst will use cutting edge tools and solutions, and collaborate with global team members across the organization to perform cyber incident response and protect UpTime365's partners against cyber threats.
Key Responsibilities:
Response to cyber security events and incidents by analyzing forensic data, logs, and threat intel to validate security threats, assess impact, determine root cause, and help coordinate remediation actions.
Maintain awareness of emerging threats.
Willingness and self -motiviation to learn and take advantage of all training opportunities provided.
Perform proactive threat hunting to identify potential threats to UpTime365 and its partners.
Partner with global incident response teams to coordinate global incident response.
Eventual participation on a rotating on -call roster for off hour escalations.
Requirements
Essential Business Experience and Technical Skills:
A bachelor's degree in cyber security or computer science, or 2 -4 years of combined IT and Cyber Security related work experience.
1 -3 years of experience analyzing logs (e.g. endpoint, network, identity), performing data correlation, and using SIEM or log management tools.
Basic understanding of the Windows operating system and command line tools, network fundamentals, and cyber security concepts and frameworks.
Scripting experience for analysis and automation of repeatable processes.
Security specific certifications from SANS and other industry recognized organizations are desirable.
Benefits
Dental insurance
Medical insurance
Vision insurance
401K
Paid vacation and sick leave
Tuition fee reimbursement
Students loan assistance
Cyber Security Analyst
Cyber security analyst job in North Charleston, SC
PRIMARY DUTIES & RESPONSIBILITIES:
Conducts regular risk assessments to identify potential vulnerabilities and threats within the AWS IL5 environment
Develops strategies for risk mitigation and implements necessary controls to address identified risks
Maintains a risk register documenting identified risks and corresponding mitigation actions
Ensures AWS configurations align with IL5 security requirements, including encryption, access controls, and network segmentation
Implements and enforces compliance with relevant security standards and regulations, such as NIST SP 800-53 and DoD IL5 requirements
Monitors AWS configurations for deviations from security baselines and promptly remediates any non-compliant settings
Implements strong IAM policies to enforce least privilege access across AWS resources
Regularly reviews IAM roles and permissions to ensure alignment with the principle of least privilege
Enables multi-factor authentication (MFA) for privileged accounts and sensitive operations
Deploys robust monitoring tools to detect unauthorized access attempts, suspicious activities, and security breaches
Establishes incident response procedures to promptly respond to security incidents and minimize their impact
Conducts post-incident reviews to identify lessons learned and improves incident response processes
Implements encryption mechanisms to protect data at rest and in transit within the AWS IL5 environment
Regularly reviews encryption policies and key management practices to ensure effectiveness
Provides regular security training and awareness programs to AWS IL5 users and administrators
Educates users about common cyber threats, phishing attacks, and best practices for secure usage of AWS resources
Encourages a culture of security awareness and proactive risk mitigation among all stakeholders
Conducts periodic security assessments and audits to evaluate the effectiveness of cyber security controls
Identifies areas for improvement and implement enhancements to strengthen the security posture of the AWS IL5 Cloud SCCA
Stays abreast of emerging cyber threats, vulnerabilities, and industry best practices to adapt security measures accordingly
Travels approximately 3-4 days a quarter, as required
DESIRED SKILLS & REQUIREMENTS:
RMF experience
USMC Cyber experience
SAFe (Scaled Agile Framework) experience
Working Place: North Charleston, South Carolina, United States Company : Scientific Research Corporation
Cyber Security Analyst - GRC Support
Cyber security analyst job in Aiken, SC
Savannah River National Laboratory (SRNL) is seeking an energetic individual with good interpersonal skills to join the Cyber Assurance, Governance, Risk Management and Compliance team! The selected individual will assist the Information Systems Security Officer (ISSO) and GRC team with NIST Risk Management Framework (RMF) processes to ensure a secure operational security posture is in place and maintained throughout the lifecycle of the system and/or network.
Minimum Qualifications:
Bachelor's degree in Computer Science, Information Assurance, or related field
4-6 years of relevant experience in NIST Risk Management Framework and Control Sets (i.e., NIST 800-37 and NIST 800-53) as a federal-contractor employee
For ability to obtain and maintain a security clearance, US Citizenship is Legally Required
Preferred Qualifications:
Working knowledge and experience with the NIST Risk Management Framework and Control Sets (i.e., NIST 800-37 and NIST 800-53) in a federal contractor role
Attention to detail and strong written communication skills (clear, concise for evidence/control implementation descriptions)
Experience with information assurance tools (GRC, Tenable.SC, Nessus, Splunk, etc.)
Ability to quickly learn new technologies, concepts, and processes
Demonstrated ability to work collaboratively in a team environment with good interpersonal skills
Active DOE L clearance
Data entry, updates and maintenance of System Security Plans and other documents/evidence in the GRC tool
Executing scans security scans (compliance and vulnerability related)
Tracking status of temporary risk findings to closure and gathering remediation evidence
Pulling configuration compliance reports, STIG checklists, CIS benchmarks
Assist with RMF Continuous Monitoring activities and new project Risk Assessments
Assist Project Security Officers and ISSOs with preparation of authorization packages for new projects and accreditation boundary
Assist with entry of new risks, updates or maintenance in the risk register
Assist in performing security impact analysis using approved security policies and SSPs and provide recommendations for meeting requirements with adequate security controls that align with business objectives.
Work effectively in a team environment to resolve issues and contribute to continuous process improvement efforts.
Participate/assist with compliance assessments/audits and data calls.
Interact with customers and peers in a professional and responsive manner.
Auto-ApplyInformation Security Analyst
Cyber security analyst job in Conway, SC
Posting Details Classification Title IT Security Specialist/ Analyst I Classification Code AM80 Pay Band 6 Subject to Drug/Alcohol Testing Guidelines No Subject to Credit Check No Internal Title Information Security Analyst Department Information Technology Services Position Type PCLS - Slotted Classified Full or Part Time Full-Time Basis 12 mo. Hours per week 37.5 hours per week Normal Work Schedule Mon-Thu: 8-5 ; Fri: 8-12:30 Job Details
Coastal Carolina University is currently accepting applications for the following full-time position: Information Security Analyst in the Office of Information Technology Services.
Coastal Carolina University's Information Technology Services is looking for an information security analyst who is responsible for monitoring, analyzing, and mitigating cybersecurity and compliance risks. The analyst will also aid in the development of solutions, research new technologies, assist in policy changes, and recommend content for security awareness programs.
How to Apply: Interested candidates may apply online at ***************************************** Applicants must submit a cover letter, resume and list of three (3) professional references. Review of applications will begin immediately and continue until position is filled.
Required Qualifications: A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for bachelor's degree on a year-for-year basis.
Preferred Qualifications: Experience with incident response, security monitoring, data loss prevention, implementing security controls, administering vendor supplied security software, risk assessment, security and privacy compliance, and/or participating on disaster recovery planning team.
Duties include, but are not limited to:
* Research information security events, incidents, and issues to isolate and identify root or systemic causes. Responds according to policy and best practices.
* Assists business units and operational teams with information security risk assessments and audits.
* Gathers, compiles, and synthesizes information for security processes and systems around vulnerabilities and risk.
* Aids in the development of solutions through security partnerships and research on new technologies, required policy changes, and vendor offerings.
* Recommends content for information security training and awareness programs.
IT Security Specialist/Analyst I (AM80/61122728/FTE-S01096P), full-time position with benefits. SC State Pay Band: 06. Salary range: $47,588.00 (minimum) - $67,817.00 (midpoint). Normal work hours are Monday through Thursday, 8:00 a.m. to 5:00 p.m. and Friday, 8:00 a.m. to 12:30 p.m. Must be flexible to meet the special scheduling needs of the university.
Coastal Carolina University is a public comprehensive liberal arts institution located in Conway, South Carolina, just nine miles from the Atlantic coastal resort city of Myrtle Beach. Coastal
Carolina University enrolls over 10,000 students from 49 states and 55 nations. The University is accredited by the Southern Association of Colleges and Schools Commission on Colleges to award the baccalaureate and master's degrees of national and/or regional significance in the arts and sciences, business, humanities, education, and health and human services, a specialist degree in instructional technology, and PhD degrees in marine science: coastal and marine systems science and education sciences.
The University provides equal employment opportunity without regard to race, color, religion, sex, sexual orientation, gender identity, citizenship status, national origin, or because an employee or applicant for employment is an individual with a disability or a disabled veteran, an Armed Forces service medal veteran, a recently separated veteran, or an active-duty wartime or campaign badge veteran, or other "protected veteran," as defined by law. Coastal Carolina University is an EO/AA employer.
Required Qualifications
A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for bachelor's degree on a year-for-year basis.
Preferred Qualifications
Experience with incident response, security monitoring, data loss prevention, implementing security controls, administering vendor supplied security software, risk assessment, security and privacy compliance, and/or participating on disaster recovery planning team.
Knowledge, Skills & Abilities
Possess knowledge of system and network security for various operating systems and local area networks. Experience with security tools and technologies for deploying, managing, measuring, and auditing system and network security. Has a foundational understanding of application, hosted service, and cloud security principles. Capable of contributing to the creation of detailed technical documentation on security processes and procedures. Demonstrates basic analytical and problem-solving skills. Understands risk concepts and principles. Communicates effectively with audiences of varying technical knowledge levels.
Posting Detail Information
Posting Number FTE-S01096P Number of Vacancies 1 Desired Start Date 01/12/2026 Position End Date (if temporary) Job Open Date 12/11/2025 Job Close Date Open Until Filled Yes Special Instructions to Applicants Quicklink for Posting ****************************************
Job Duties
Senior Cyber Security Analyst - (ISSM)
Cyber security analyst job in Aiken, SC
DNI is on the lookout for a Senior Cyber Security Analyst - Information Systems Security Manager (ISSM) to deliver expert guidance in Information Systems Security and cybersecurity support for the Enterprise Information Services at the Department of Energy (DOE) Savannah River Operations Office (DOE-SR), located at the Savannah River Site (SRS) in Aiken, SC.
Requirements
Reports to the Chief Information Security Officer (CISO) and Program Manager.
Oversee the Authority to Operate (ATO) lifecycle, manage risk assessments, develop and monitor Plan of Action and Milestones (POAMs), ensuring compliance with security standards and timely mitigation of organizational boundary security risks.
Actively participate in the bi-weekly accreditation boundary meetings and keep the AODR informed of any changes/updates to eRAMS/POA&Ms/STAR items or any new VPM and CM issues that may arise.
Provide technical and procedural cyber security advice to DOE, associate contractor partners, and Industrial Control Systems (ICS) teams as necessary.
Oversee operational information systems security implementation programs.
Coordinate with Information System Security Officer (ISSO) or PSO on approval of External Information Systems (e.g. guest systems, interconnected system with another organization).
Oversee ISSOs to ensure they follow established policies and procedures and timelines.
Ensure CM policies and procedures for authorizing the use of hardware/software on an IT system are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the AODR prior to the addition, change or modification. ISSM shall have authority to veto any proposed change they feel is detrimental to security in boundaries under their purview. Appeals on an ISSM/ISSO veto may be taken to the AODR.
Ensure approved procedures are used for sanitizing and releasing system components and media as necessary.
Ensure proper measures are taken when cyber security incident or vulnerability is discovered.
Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures.
Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.
Manage, maintain, and execute the information security continuous monitoring plan.
Ensure a record is maintained of all security-related vulnerabilities and ensure serious or unresolved violations are reported to the AODR; and assess changes to the system, its environment, and operational needs that could affect the security authorization.
Other related tasks as assigned.
Support information technology (IT) security goals and objectives and reduce overall organizational risk; Advise senior management (e.g., Chief Information Security Officer [CISO] and Chief Information Officer [CIO] on risk levels and security posture.); Advise appropriate senior leadership of changes affecting the organization's cybersecurity posture; Communicate the value of information technology (IT) security.
Knowledge, Skills, and Abilities:
Highly organized individual with exceptional communication skills, ensuring all stakeholders are consistently informed and updated as required.
Excellent written and oral communication skills (writing samples may be requested).
Attention-to-detail is critical, proven ability to look closely at your work to identify and correct errors, spot and improve weaknesses and produce a near-perfect end-result.
Ability to identify problems, brainstorm and analyze answers, and implement the best solutions.
Ability to develop and review security related procedures or processes and reports.
Demonstrated ability to provide clear, precise, and factual information to senior leaders, team members, and external stakeholders.
Capable of attending all customer-required meetings and promptly providing responses as requested.
Familiarity with applicable regulations affecting Cyber Security NIST 800 Series Standards.
Clearance:
Must possess (or be able to obtain) a “Q” level security clearance.
Education:
A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for education on a year-for-year basis.
Experience:
7+ years in IT security or related field.
Authority to Operate Life Cycle (ATO), Risk Management, POAMS & Milestones
Certification:
Highly desired certifications:
Certified Information System Security Professional (CISSP)
Certified Information Security Manager (CISM)
Benefits
Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental
Matching 401K
Short- and Long-Term Disability
Pet Insurance
Professional Development/Education Reimbursement
Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas
Other Duties:
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
Network Security Analyst
Cyber security analyst job in Augusta, GA
Network Security AnalystLOCATIONFort Eisenhower, GA 30905CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplySystems Cybersecurity
Cyber security analyst job in Warner Robins, GA
Job Description
At Credence, we support our clients' mission-critical needs, powered by technology. We provide cutting-edge solutions, including AI/ML, enterprise modernization, and advanced intelligence capabilities, to the largest defense and health federal organizations. Through partnership and trust, we increase mission success for warfighters and secure our nation for a better future.
We are privately held, are repeatedly recognized as a top place to work, and have been on the Inc. 5000 Fastest Growing Private Companies list for the last 12 years. We practice servant leadership and believe that by focusing on the success of our clients, team members, and partners, we all achieve greater success.
Credence has an immediate need for a Systems Cybersecurity at the journeyman level to support the mission of the Global Hawk (AFLCMC/WIAG) and U-2 (AFLCMC/WIA) Division is to provide continuous, high altitude long endurance (HALE), all-weather, day/night, wide area reconnaissance and surveillance remotely piloted aircraft (RPA) systems. Global Hawk and U-2 Division is located at both Wright Patterson AFB, OH and Robins AFB, GA. The mission of the Sustainment Branch (AFLCMC/WIAGA) is to provide sustainment support to the operational Global Hawk fleet to include aircraft, payloads, and ground assets. Sustainment Branch is located at Robins AFB, GA. The mission of the International & New Business Branch (AFLCMC/WIAPC) is to avail exportable versions of all-weather, day/night, wide area reconnaissance HALE RPA capabilities to international US partners. International & New Business Branch is located at Wright Patterson AFB, OH.
This job is onsite on Robins AFB, GA.
Requirements
Responsibilities include, but are not limited to the duties listed below
At the initiation of the period of performance and throughout the period of performance of the contract, the Systems Cybersecurity will ensure, as a minimum, 50% of the total labor provided to deliver cybersecurity services is certified in accordance with DoD 8570.01-M standards. (CDRL A001).
Will ensure all system deliverables comply with DoD and Air Force cybersecurity policy, specifically DoDI 8500.01, Cybersecurity, and AFI 33-200, Air Force Cybersecurity Program Management.
To ensure cybersecurity policy is implemented correctly on systems, you will ensure compliance with DoD and Air Force Certification and Accreditation policies, specifically Department of Defense Instruction (DoDI) 8510.01, Risk Management Framework (RMF) for DoD Information Technology, and AFI 33-210, The Risk Management Framework (RMF) for Air Force Information Technology.
Will support activities and meet the requirements of DoDI 8520.02, Public Key Infrastructure (PKI) and Public Key (PK) Enabling, to achieve standardized, PKI- supported capabilities for biometrics, digital signatures, encryption, identification and authentication.
Education, Requirements and Qualifications
Active TS/SCI required
Bachelor's or master's degree in a related field and at least three (3) years of experience in the respective technical / professional discipline being performed, three (3) of which must be in the DoD or other United States Government (USG) ISR/SOF Organizations.
OR, seven (7) years of directly related experience with proper certifications as described in the PWS labor category performance requirements, five (5) of which must be in the DoD or other USG ISR/SOF Organizations.
Excellent written and verbal communication skills
Job may require the employee to be:
Willingness to travel if needed.
In a stationary position 50% of the time
Able to ascend/descend stairs as needed
Able to move equipment not to exceed 25 lbs. as needed.
Please join us, as together we build a better world one mission at a time powered by technology and its people!
#LI-Onsite
#veteranemployment #militaryspouse #milspouse #hireavet #militaryveteran #militaryfriendly #transitioningmilitary #veterans #militarytransition #militaryfamilies #msep #militarytocivilian #military #federalcontractingjobs #defensecontracting #defenseindustryjobs
Benefits
Health Care Plan (Medical, Dental & Vision)
Retirement Plan (401k, IRA)
Life Insurance (Basic, Voluntary & AD&D)
Paid Time Off (Vacation, Sick & Public Holidays)
Family Leave (Maternity, Paternity)
Short Term & Long Term Disability
Information Security/Privacy Analyst
Cyber security analyst job in Robins Air Force Base, GA
Responsibilities
Peraton is seeking an Information Security/Privacy Analyst for its' Product Data Systems Support program within our Cyber Mission Sector.
Location: Robins Air Force Base, GA. This is a full-time on-site role.
In this role, you will:
Ensure that security policies, procedures, and directives of the National Industrial Security Program Operating Manual NISPOM manuals are followed.
Maintain oversight and compliance of existing information systems through technical reviews and system auditing.
Interface with program management and customers on security requirements implementation, required documentation, and classification management.
Provide information systems security guidance awareness and training and participates in customer security inspections and reviews.
Manage, develop, prepare, implement, and maintain security plans, standard operating procedures (SOPs), security tests, and evaluation plans.
Collaborate with internal security and IT staff to ensure the continued compliance and secure operation of accredited information systems.
Keep abreast of industry best practices and trends, as well as new technologies, and then plans and advises for implementation.
Manage 3 A&A packages utilizing eMASS for system approval.
Submit POA&Ms for TCNO, STIG, or other system deficiencies.
Coordinate with systems administrators, developers, and other team members for issue resolution, coordination or clarification.
Review change requests for system security impacts.
Review System Access Requests for the systems administered by the organization.
Revalidate email organizational accounts.
Create and modify security group requests, adding and removing users to groups.
Answer cyber related security questions from team members within organization.
Ensure compliance with DoD/AF instructions, directives, EOs and other regulations.
Qualifications
Required:
Bachelor's degree with a minimum of 5 years of relevant experience, Master's degree with 3+ years of relevant experience, Associate's degree with an minimum of 7 years of relevant experience, or 9 years of relevant experience in lieu of a degree.
Familiarity with Risk Management Framework (RMF) and NIST SP 800-53 controls.
Experience in analysis of security plans and policies.
Demonstrated ability to be self-motivated, self-supervisory, and results oriented.
Demonstrated organizational skills and strong verbal/written communication skills.
The ability to obtain/maintain Security+ certification within 6 weeks of hire date.
The ability to obtain a Common Access Card (CAC).
U.S. citizenship required.
The ability to obtain a DoD level Secret security clearance.
Preferred:
General experience with DoD networks.
Current Security+ certification.
Current CISM, CIPA, CISSP professional certification.
An active DoD level Secret security clearance.
Experience with Enterprise Mission Assurance Support Service (eMASS).
Benefits:
At Peraton, our benefits are designed to help keep you at your best beyond the work you do with us daily. We're fully committed to the growth of our employees. From fully comprehensive medical plans to tuition reimbursement, tuition assistance, and fertility treatment, we are there to support you all the way.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range $80,000 - $128,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
Auto-ApplyInformation Security Analyst
Cyber security analyst job in Atlanta, GA
360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement.
Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and JQuery mobile.
Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one's business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel's through us.
We make sure that we deliver performance driven products that are optimally developed as per your organization's needs. Take a shot at us for your IT requirements and experience a radical change.
Job Description
The candidate will be a member of the Application Security Assessment (ASA) Team enforcing Global Cyber Security & Fraud at First Data. This includes automated vulnerability scanning mixed with manual penetration testing against web-based applications, web services, and thick client applications.
Job Specific Responsibilities Utilize dynamic and static application security testing tools effectively, including IBM AppScan Standard, Fortify SCA, Burp Suite Pro, and Qualys.
Host developer-focused appsec training workshops on topics including secure coding and vulnerability remediation.
Coordinate testing objectives, reporting deliverables, and remediation efforts as the liaison between the financial institution(s), First Data, and third-party assessors.
Provide documented guidance to development teams that define effective remediation solutions for vulnerabilities.
Contribute to maintaining First Data Corporation's PCI-DSS certifications through addressing regulatory requirements.
Availability to work occasional off-hours to complete assessments tied to meeting critical business objectives.
Interview Required: Yes
Information Technology-Info Security Analyst - Information Technology-Info Security Analyst
Qualifications
Bachelors Degree in Information Security, Computer Science, I.T., I.S., Engineering, Analytics or equivalent.
Hands on technical experience with dynamic and static security testing tools, including source code assessments.
Deep analytical skills, strong out-of-the-box thinking.
Ability to effectively perform detailed-oriented technical information security work on a full-time basis.
Excel independently in a fast-paced environment.
Effective oral and written communication skills.
Preferred Qualifications Masters Degree in Information Security, Computer Science, I.T., I.S., Engineering, Analytics or equivalent.
Proficient web-application developer with demonstrable knowledge of HTML, C/C++, Java, VB, Ruby, etc.
CEH, Security+, GWAPT
Additional Information
Regards,
Vikas Kumar
vikas.kumar(@)360itpro.com
Information Security Engineer
Cyber security analyst job in Greer, SC
Proterra offers a dynamic and supportive workplace where our employees can thrive personally and professionally. With cutting-edge facilities and groundbreaking projects, Proterra offers unique opportunities to grow, collaborate, and lead transformative change in the electrification of heavy-duty transportation and equipment.
Our commitment to innovation extends beyond our battery solutions to our people, where we create an environment where everyone feels valued, supported, and empowered to drive change for the earth. Here at Proterra we strive to foster a culture of inclusivity, valuing diverse perspectives and encouraging bold ideas, allowing our employees to bring their full selves to work. Our employees benefit from competitive total rewards packages, and opportunities to develop professionally.
Position Overview:â¯
The Information Security Engineer will be responsible for developing, enhancing, and executing Information Security Operations at Proterra.⯠In this position you will assist with the maintenance and implementation of IT security systems to protect Proterra's corporate, manufacturing, cloud and IoT environments from cyber-attacks. You will maintain and lead incident response and escalations with our security operations center, be responsible for vulnerability management and participate in the creation or improvement of company security policies/ procedures.⯠You will be responsible for conducting/leading risk assessments and participating in and supporting security assessments and audits. Additionally, you will be assisting with evaluation, setup and utilization of new security products and technologies.â¯
About the Role - You will:â¯
Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
Work with cross functional teams to support security requirements to protect organization's corporate, manufacturing, cloud and IoT environments from cyber-attacks.
Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems, anti-virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.â¯
Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
Work with cross functional teams to support security requirements to protect organization's corporate, manufacturing, cloud and IoT environments from cyber-attacksâ¯â¯
Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems, anti-virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.â¯
Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
Assist Crowdstrike Falcon Complete team in remediation of critical information security incidents in coordination with 3rd party SOC team.â¯
Implement and maintain security controls and have a suitable knowledge of existing cyber threats to infrastructure and clouded environments.â¯
Participate in scheduled security assessment activities and projects to ensure industry compliance.â¯
Initiate and maintain Security Incident Response Plan (SIRT) and After-Action Reports (AARs) to maintain operational continuityâ¯
Identify, analyze and interpret threat actors and malicious activity in client environments act upon and take the appropriate actions towards remediation and documentation.â¯
Differentiate between potential intrusion attempts and pinpoint false alarmsâ¯by working with EDR, Identity Protection and NextGen SIEM to develop resolution plans.
Perform 3rd party vendor assessments and fulfill Proterra security assessments requirements
Triage and respond to security events - serve as a primary responder for incidents, taking ownership of incidents and tracking through resolution.â¯
Performs other related duties as assigned.â¯
Your Experience Includes:
3-5 years of related information technology infrastructure experience⯠with identity and access management [IAM], SSO solutions including (SAML 2, OAuth 2, OIDC).
Some experience in securing enterprise networks, including firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and secure network protocols (e.g., IPsec, SSL/TLS) heavy emphasis in SaaS apps such as Crowdstrike Falcon Complete, Netskope DLP, Nessus Tenable and asset management platforms such as Axionus.
Overall Knowledge of endpoint protection technologies (e.g., anti-malware, EDR, DLP), and experience in managing and securing workstations, mobile devices, and servers.
Have participated in penetration testing, vulnerability assessments, and red teaming exercises.
General understating of industry standards, compliance, and legal requirements (ISO 27001, FedRAMP, NIST 800-171, NIST 800-53, SOC2, etc.)â¯
Excellent trouble-shooting abilities in software and hardware and be able to lead outage calls and trouble-shooting conversations until resolved and provide detailed root cause analysis reports.â¯
Above average understanding in vulnerability reporting using Saas platforms such as Nessus Tenable.
Education:
Bachelor's degree in computer science, Information Security, Electrical Engineering or Management Information Systems preferred. Equivalent years of consecutive IT security experience with recognized industry certifications may be considered.
Certifications:
CISSP, CASP+, SSCP+, or other relevant security certificatesâ¯
Certified Ethical Hacking (CEH) CISSP, CISA
Network+, Security+, Linux+ or combination of similar certificates acceptable.
Applicants must be authorized to work for any employer in the U.S. There is no immigration sponsorship available for this role (ex: H1-B, OPT, CPT, TN or any other employment sponsorship).â¯
#LI-BJ1
Information Security Analyst - Threat Intelligence
Cyber security analyst job in Alpharetta, GA
Are you passionate about the changing threat landscape, love the challenge of understanding how the latest malware works, and can evangelize the risks and issues across a broad organization? Are you looking for a challenging leadership position that will allow you to shape the future of security across the internet? Do you thrive on working with a close-knit, highly-motivated team?
Come join Lancope's threat intelligence team to help protect Lancope's customers against cyber-attacks. The successful candidate will join a global team of senior security analysts focusing on the changing threat landscape and effect on Lancope's customers. This position requires a professional with a strong security software and threat analysis background that is capable of identifying and establishing the relationships and processes within and external to Lancope to build an investigative threat research structure and flow. The team will source data across Lancope, i.e. internal product and traffic monitoring groups, as well as through external partner and qualified third-party relationships.
Lancope is looking for a full time Information Security Analyst for Lancope's Threat Intelligence Team. Analysts in this role will have experience in threat research and a desire to own innovative ideas from invention, through proof-of-concept, and to deployment.
Primary Responsibilities
Conduct literature reviews and keep abreast of state of the hack, data sources, data analysis techniques and big data
Invent and/or apply new techniques to telemetry data on a global scale and identify new security threats
Develop and document proofs-of-concept (POCs) to demonstrate the efficacy, performance, and scalability of new techniques
Publish and present research findings, including methodology and measured efficacy improvements
Help guide the development by working with product teams
Partner to turn successful POCs into product features and actionable intelligence.
Education and Experience
The ideal candidate for this role brings considerable experience, motivation, and organization along with both intense curiosity and desire to make an impact in internet security. Researchers in this role enjoy considerable latitude and work hands-on to complete all phases of applied research. The successful applicant will have demonstrable skills in some of the below areas:
At least 2 years relevant experience
Network administration, System administration (Windows or Unix)
IT security with a focus on computer forensics, incident response, malicious code/exploits, anti-virus, etc.
Knowledge of the current security threat landscape, especially network and web-based threats
Familiar with Windows exploits, malware and malicious code trends
Knowledge of TCP/IP and application in securing systems, investigating security incidents
Solid understanding of computer science fundamentals, software engineering
Knowledge of one or more programming/scripting languages
Web application and script development
Log and data analysis
Strong written and verbal communication
Self-motivated and highly ambitious
Creative problem solving skills and excellent troubleshooting/debugging skills
Excellent teamwork and people skills
Ability to manage multiple tasks and work towards long-term goals
Incident response experience a definitive plus
Information Security Analyst - IV
Cyber security analyst job in Alpharetta, GA
America Networks is a leading sensor and networking solutions partner for companies in any Industrial, Manufacturing, and Waste management space. We design and manufacture sensors for storage tanks, water metering, energy metering, gas monitoring, and asset management.
Our founders are hardcore telecommunications engineers with combined 200 + years of experience in designing, optimizing and performance engineering; for several mid - large wireless carriers internationally - that saw a need to provide low power, cost efficient sensors to collect data, create alerts, and predict needed actions. We have combined these sensors with low power, wide area (LPWA) networking technologies to provide clients various options to decrease re-occurring costs associated with operating an IoT network of sensors and connected devices.
We specialize in design, deployment, optimization, and support of these Networks. Whether an off-the-shelf or custom solution is needed, we'll create a solution and push the data on the best cloud platform to fit your needs, including your own.
Job Description
The responsibility of this position includes data protection, logging and monitoring for data security of our Big Data and Enterprise Data Warehouse platforms. Tools will be used to classify column level data according to confidentiality categories. This position will also be responsible for development and deployment of advanced data science algorithms to automatically detect and alert data usage anomalies. Encryption, tokenization, data masking, etc. will be applied to data according to confidentiality levels.
• B.S. or equivalent work experience
• 6+ years in related discipline
• Experience with all phases of the Software Development Lifecycle, including system analysis, design, coding, testing, debugging and documentation
• Teamwork & collaboration skills to work across organizations and lead cross-functional teams
• Communication & stakeholder management skills
• Problem solving skills to develop quick yet sound solutions to resolve complex issues
• Programming Language(s): KSH, JAVA
• Software: SHA 256, MD5, SSH, SSL, TLS, Teradata Tools and Utilities (BTEQ, MLoad, FastExport, FastLoad, TPT, TDCH, Query Grid, etc.), Hortonworks Hadoop software (Sqoop, HIVE, HBASE, SPARK, KAFKA, Kyvos, Ranger, Knox, Kerebos, etc.), Informatica software (Secure@Source, TDM, DDM, PowerCenter, BDM, EIC, IDL, IDQ, IIS, etc.), Aster, Tableau, Cognos, Qlik and other BI tools.. AWS cloud security for Hadoop/Teradata and HPE Voltage.
Demonstrated excellent teamwork and also ability to work independently with minimal supervision.
Expert knowledge of the wireless industry and data management activities.
Must have Hadoop and cloud security expertise with usage logging, monitoring, tokenization/encryption, access controls, and analysis.
Additional Information
Vivek Salvatore
vivek.salvatore(@)americanetworks.com
(
*************
Information Security Associate or Specialist
Cyber security analyst job in Alpharetta, GA
The use of IT (Information Technology) infrastructure in the company is vital for daily operation. The IS (Information Security) Specialist should Provide secure Information Technology infrastructure service to the company as well as companywide employees and staff.
Role Description.
Define and implement Macro (Servers, Groups and Shared resource) and Micro (Personal and Single) IT infrastructure. Analyze, Plan, Design, Develop and Implement IT Infrastructure and IT Security solutions to support company IT requirements. Analyze and prevent any Information risk ensuring the companys information integrity. Define, maintain and monitor the execution of IS and IT policies. Execute and monitor company IT/IS Compliance.
Essential Duties and Responsibilities
-Monitoring and maintaining computer systems and networks
-Responding in a timely manner to service issues and requests
-Providing technical support across the company
-Support equipment repair and replacement service
-Testing Benchmarking new technology
-Maintain and execute IT Training program for new employs
-Monitor IT/IS Infrastructure (including servers and network devices) to ensure data integrity
-Reporting of daily system issues.
-Analyze and propose system improvements.
-Documentation related to IT/IS policies, issues, and procedures.
-Participation and active analyst, designer, and developer in IT projects.
-Monitoring of IT/IS infrastructure-related expenses.
-Other duties as assigned.
Requirements
Qualifications: Listed below are the minimum and/or desired qualifications of the position including education, work experience, and knowledge & skills that are required to perform satisfactorily in the position:
Education and Work Experience:
-Vocational or undergraduate degree in information systems and computer science or related field.
-One (1) to three (3) years of information systems, computer science and/or IT-related experience.
Knowledge and Skills:
-PC and Server management
-IT Hardware and Software installation
-Initiative skills
-Problem-solving skills
-Understanding of IT infrastructure and application architectures
-Great Social and Communication Skills
-Great Oral and Written Communication Skills
-System process analysis and design capabilities/experience
-Server Operating systems (Windows Server, Linux, HP-UX, Unix, Sun Solaris)
-Antivirus, NAC, DLP, MDM and other IS Solutions
-IS Related definition and policies (ex. ISO 27001)
-Networking (Cisco/HP) and network devices (Routers and Switch)
-VPN
-TCP/IP, UDP, Network standards
-LDAP, Active Directory and Exchange
-Access Control
-Security Cameras
-Firewall, Web Filter and other network security appliance solutions
-Database systems (SQL Server/MySQL/Oracle) and programming skill (is a plus)
-MS Office skills (especially Excel skills)
Physical Demands:
-Position requires sitting at a desk working on a computer for at least 2/3 of time.
-Position requires regular and reliable attendance.
-Position requires local travel up to 10% of the time.
Information Security Analyst 2
Cyber security analyst job in Duluth, GA
Join Our Team In 2025, USA Today recognized Primerica as a Top Workplace USA for the fifth year in a row, and Newsweek named Primerica one of America's Greatest Workplaces for Diversity for the second consecutive year. In 2024, the Atlanta Journal-Constitution named Primerica as a Top Workplace for the eleventh consecutive year, and Forbes recognized Primerica as one of America's Best Employers for Women for the fifth year in a row. In addition, for the tenth time Primerica has been voted a Best Employer by Gwinnett Magazine. Primerica is a great place to work! Join our team to experience what it's like to work at "one of the best places to work in the metro Atlanta".
About this Position
The Information Security Engineering Analyst is an integral part of the IS Engineering team. This position will lead security efforts to design, implement, administer, and support information security technologies and processes that will ensure data and systems are adequately protected. It requires performing a broad range of security duties requiring a working knowledge of cyber security and several supporting technologies. The Analyst will work with project teams to define security requirements for programs, applications, processes, and new platform systems in line with the enterprise information security architecture.
Responsibilities & Qualifications
* Support and manage security infrastructure, including but not limited to; Proxies, NextGen Firewalls, IDS/IPS, SIEM, Sandboxing technologies, APT solution, etc.
* Participate in Vulnerability and Threat Management program
* Perform root cause analysis on security incidents
* Apply effective communication to translate complex technical security deficiencies into business risks that are understood by business stakeholders when making decisions for future security investments
* Use an information security architecture framework and methodology to enable reuse of information security components across the enterprise
* Assist proof-of-concept activities for innovation initiatives to ensure coverage of information security requirements
* Perform additional security-related duties as requested
* Bachelor's degree in Computer Science, Information Systems, CyberSecurity, or 2-3 years related experience
* CISSP or other Security Certifications are preferred, or willing to obtain
* Experience with SIEM technologies, including development
* Experience with Host based Security controls
* Experience in the vulnerability assessment lifecycle from the point of identification to remediation including penetration testing and source code analysis tools
* Ability to research, analyze and resolve complex problems with minimal supervision and escalate issues as appropriate
* Able to work independently and be a self-starter; managing multiple tasks according to priorities; results oriented and proven ability to meet deadlines
Hybrid role
Location: Atlanta, GA
FLSA status:
This position is exempt (not eligible for overtime pay):
Yes
Our Benefits:
* Day one health, dental, and vision insurance
* 401(k) Plan with competitive employer match
* Vacation, sick, holiday and volunteer time off
* Life and disability insurance
* Flexible Spending Account & Health Savings Account
* Professional development
* Tuition reimbursement
* Company-sponsored social and philanthropy events
It has been and will continue to be the policy of Primerica, Inc., and its subsidiaries to be an Equal Opportunity Employer. We provide equal opportunity to all qualified individuals regardless of race, sex, color, religious creed, religion, national origin, citizenship status, age, disability, pregnancy, ancestry, military service or veteran status, genetic or carrier status, marital status, sexual orientation, or any classification protected by applicable federal, state or local laws.
At Primerica, we believe that diversity and inclusion are critical to our future and our mission - creating a foundation for a creative workplace that leads to innovation, growth, and profitability. Through a variety of programs and initiatives, we invest in each employee, seeking to ensure that our people are not only respected as individuals, but also truly valued for their unique perspectives.
Auto-ApplySecurity Systems Engineer / Estimator
Cyber security analyst job in Norcross, GA
Security Systems Engineer / Estimator
About Us We're looking for a highly motivated and skilled Security Systems Engineer / Estimator to join our team. This is a full-time, on-site position focused on designing, engineering, estimating, and supporting integrated electronic security solutions.
What You'll Do
System Design & Engineering
Design and configure integrated security systems (CCTV, access control, intrusion detection, intercoms).
Prepare scopes of work (SOWs), bills of materials (BOMs), cost estimates, and design narratives.
Analyze blueprints, drawings, and specifications to deliver compliant solutions.
Provide accurate and competitive proposals in response to RFPs.
Support CAD teams with drawings, device details, and schedules.
Pre-Sales & Client Engagement
Partner with sales during pre-bid opportunities, site walks, and customer meetings.
Act as a technical resource for discovery and client-facing discussions.
Present technical information clearly to clients and internal teams.
Build lasting client relationships with expert advice and support.
Project Execution & Support
Work with project managers and operations teams for smooth project handoff.
Provide technical support during installation, commissioning, and post-deployment.
Troubleshoot hardware, software, and networking issues.
Ensure compliance with industry standards and client requirements.
Continuous Improvement
Stay current on emerging technologies, trends, and vendor offerings.
Attend manufacturer training and pursue relevant certifications.
Help drive adoption of new processes and tools.
What You'll Bring
Education & Experience
Associate or Bachelor's degree in Electrical Engineering, IT, or related field, or equivalent work experience.
3-5+ years in security system engineering, design, or estimating.
Experience in pre-sales design/estimating and client proposals.
Technical Expertise
Hands-on with Lenel, Genetec, Avigilon, Milestone, Axis, Hanwha, Panasonic, HID, Software House.
Basic knowledge of IP networking, PoE, subnetting, and system integration.
Familiar with electrified door hardware, locking devices, relay connections, and voltage limitations.
Understanding of wireless communications, switches, routers, firewalls is a plus.
Ability to read and interpret blueprints and wiring diagrams.
Skills & Competencies
Proficiency in Microsoft Office Suite.
Strong problem-solving, troubleshooting, and attention to detail.
Excellent communication skills, written and verbal.
Self-motivated, reliable, and deadline-driven.
Strong organizational and time management abilities.
Preferred Certifications
LenelS2, Genetec, Avigilon, Milestone, Software House.
AutoCAD or system design software (Bluebeam, System Surveyor).
Knowledge of cybersecurity principles for physical security systems.
Join Our Team
If you're passionate about security technology and want to contribute to delivering best-in-class solutions, we'd love to hear from you. Apply today!
Auto-ApplyCyber Security Analyst, Intermediate
Cyber security analyst job in Aiken, SC
Savannah River National Laboratory (SRNL) is seeking a Cyber Security Analyst to join the Cyber Engineering team! The selected individual will work with other team members to ensure robust security controls are selected, implemented, and maintained for a NIST RMF accredited boundaries within unclassified environments.
Minimum Qualifications:
Bachelor's degree in relevant field of study and 4-6 years of work experience
At least 1 general cybersecurity certification and 1 technical certification
Technical skills include: understanding security architectures, encryption, firewalls, IDS/IPS, Network security protocols, and applying STIGs.
Experience and proficient with cyber tools for vulnerability assessments, SEIM, Endpoint protection and security frameworks.
Strong understanding of risk management and experience with familiarity with cloud security principles
Soft skills include excellent communication and interpersonal skills, strong attention to detail, ability to multi-task and to collaborate in a team environment
For ability to obtain and maintain a security clearance, US Citizenship is Legally Required
Preferred Qualifications:
Understanding of NIST Risk Management Framework and Control Sets (i.e., NIST 800-37 and NIST 800-53)
Current of former experience with DOE cybersecurity or a federal-contractor cybersecurity technical position
Experience with zero-trust architecture
Ability to learn new technologies, concepts, and processes quickly
Splunk or Tenable Certifications
Active DOE clearance
Team in designing, implementing, and maintaining secure environments applying the NIST RMF framework.
Develop strategies for complex security strategies unique to their operating environment.
Implement enforceable technical security controls for protection of networks and systems using authorized sources such as STIGs and SRGs
Support the ISSO with the technical aspects of the development and ongoing maintenance of security controls and authorization activities
Perform and review technical assessments and security reports
Work effectively in a team environment to resolve issues and contribute to continuous process improvement efforts
Interact with customers and peers in a professional and responsive manner to ensure secure practices.
Provide expert support and communicate effectively on security matters
Auto-ApplyInformation Security Analyst 2
Cyber security analyst job in Duluth, GA
Join Our Team
In 2025, USA Today recognized Primerica as a Top Workplace USA for the fifth year in a row, and Newsweek named Primerica one of America's Greatest Workplaces for Diversity for the second consecutive year. In 2024, the Atlanta Journal-Constitution named Primerica as a Top Workplace for the eleventh consecutive year, and Forbes recognized Primerica as one of America's Best Employers for Women for the fifth year in a row. In addition, for the tenth time Primerica has been voted a Best Employer by Gwinnett Magazine. Primerica is a great place to work! Join our team to experience what it's like to work at “one of the best places to work in the metro Atlanta”.
About this PositionThe Information Security Engineering Analyst is an integral part of the IS Engineering team. This position will lead security efforts to design, implement, administer, and support information security technologies and processes that will ensure data and systems are adequately protected. It requires performing a broad range of security duties requiring a working knowledge of cyber security and several supporting technologies. The Analyst will work with project teams to define security requirements for programs, applications, processes, and new platform systems in line with the enterprise information security architecture. Responsibilities & Qualifications
Support and manage security infrastructure, including but not limited to; Proxies, NextGen Firewalls, IDS/IPS, SIEM, Sandboxing technologies, APT solution, etc.
Participate in Vulnerability and Threat Management program
Perform root cause analysis on security incidents
Apply effective communication to translate complex technical security deficiencies into business risks that are understood by business stakeholders when making decisions for future security investments
Use an information security architecture framework and methodology to enable reuse of information security components across the enterprise
Assist proof-of-concept activities for innovation initiatives to ensure coverage of information security requirements
Perform additional security-related duties as requested
Bachelor's degree in Computer Science, Information Systems, CyberSecurity, or 2-3 years related experience
CISSP or other Security Certifications are preferred, or willing to obtain
Experience with SIEM technologies, including development
Experience with Host based Security controls
Experience in the vulnerability assessment lifecycle from the point of identification to remediation including penetration testing and source code analysis tools
Ability to research, analyze and resolve complex problems with minimal supervision and escalate issues as appropriate
Able to work independently and be a self-starter; managing multiple tasks according to priorities; results oriented and proven ability to meet deadlines
Hybrid role
Location: Atlanta, GA
FLSA status:
This position is exempt (not eligible for overtime pay):
YesOur Benefits:
Day one health, dental, and vision insurance
401(k) Plan with competitive employer match
Vacation, sick, holiday and volunteer time off
Life and disability insurance
Flexible Spending Account & Health Savings Account
Professional development
Tuition reimbursement
Company-sponsored social and philanthropy events
It has been and will continue to be the policy of Primerica, Inc., and its subsidiaries to be an Equal Opportunity Employer. We provide equal opportunity to all qualified individuals regardless of race, sex, color, religious creed, religion, national origin, citizenship status, age, disability, pregnancy, ancestry, military service or veteran status, genetic or carrier status, marital status, sexual orientation, or any classification protected by applicable federal, state or local laws.
At Primerica, we believe that diversity and inclusion are critical to our future and our mission - creating a foundation for a creative workplace that leads to innovation, growth, and profitability. Through a variety of programs and initiatives, we invest in each employee, seeking to ensure that our people are not only respected as individuals, but also truly valued for their unique perspectives.
Auto-Apply