AI Security Analyst
Cyber security analyst job in Allentown, PA
IT Security Analyst II - AI & Emerging Technology Security (Contract)
We are seeking a Junior to Mid-Level IT Security Analyst with hands-on exposure to AI, Generative AI, and Agentic AI security. This role supports a Product Security organization focused on implementing security guardrails for AI-enabled applications. You will work closely with Data, AI, and Product teams to secure machine learning pipelines, large language models, and agent-based systems in a cloud-native enterprise environment.
Key Responsibilities
Embed security controls into AI/ML models, LLM-based applications, and agentic workflows across the SDLC
Conduct security reviews of Generative AI, traditional ML models, and supporting data pipelines
Identify and mitigate AI-specific threats such as prompt injection, data poisoning, model abuse, and insecure agents
Support and apply AI security standards aligned with NIST, ISO, and emerging AI governance frameworks
Partner with legal, compliance, and privacy teams on AI risk management and regulatory requirements
Assist in evaluating and operating AI security and observability tools for model monitoring and data protection
Contribute to internal guidance and training on secure AI development practices
Required Qualifications
Bachelor's degree in Computer Science, Information Security, or related discipline
2+ years of experience in cybersecurity, with exposure to AI/ML environments
Experience with cloud-native security concepts and threat modeling
Understanding of AI/ML concepts including model training, inference, data labeling, and adversarial attacks
Familiarity with core security domains such as authentication, encryption, network security, and IAM
Strong communication and collaboration skills within agile or SAFe-based teams
Preferred / Nice-to-Have Skills
Experience with AI security platforms such as Zenity or HiddenLayer
Familiarity with Microsoft security and AI governance tooling, including:
Microsoft Defender for Cloud
Microsoft Defender for Cloud Apps
Azure AI Content Safety
Microsoft Purview (data governance / DLP)
Exposure to Power Platform, Power BI, or low-code environments, especially implementing DLP or data governance controls
Experience with AI model governance or AI security programs
Security or cloud certifications (e.g., CCSK, CEH, or AI-focused credentials)
Scripting or automation experience for security testing and validation
Cloud Security Engineer
Cyber security analyst job in Philadelphia, PA
Apply now: Cloud Security Engineer (Principal InfoSec Specialist), location is Hybrid (Philadelphia, PA). The start date is 12/22/25 for this contract-to-hire position.
Job Title: Cloud Security Engineer (Principal InfoSec Specialist)
Location-Type: Hybrid (80% remote, 20% onsite - Philadelphia, PA)
Start Date Is: 12/22/25
Duration: 6-month contract-to-hire
Compensation Range: $80-102/hr on W2 ONLY
Job Description:
Serve as a subject matter expert for cloud security architecture and controls, driving risk-based outcomes and optimizing cloud security operations in a hybrid multi-cloud environment.
Day-to-Day Responsibilities:
Design, implement, and optimize cloud security controls and tools
Support cloud migration and secure cloud services delivery
Collaborate across internal teams and vendors on security architecture
Manage security tools like EDR, SIEM, IAM, CSPM
Lead or support incident response, system hardening, and compliance activities
Participate in audits, risk assessments, and governance forums
Mentor junior InfoSec engineers
Ensure alignment with industry standards and compliance frameworks
Requirements:
Must-Haves:
Bachelor's Degree
12+ years of IT experience, with 6+ years in InfoSec and 3+ years in IAM, RBAC, or related areas
Strong experience with cloud/virtualization technologies (Azure preferred)
Experience with multi-cloud security, identity management, and regulatory compliance
Proficiency in tools like Microsoft Defender, Sentinel/Splunk, Wiz, Entra ID, Terraform
CISSP certification
Nice-to-Haves:
Cloud security certifications (e.g., Azure Security Engineer, AWS Certified Security)
Experience working with high-performance matrixed teams
Familiarity with clinical systems (e.g., Epic, Lawson) and SDLC methodologies
Benefits:
This role is eligible to enroll in both Mondo's health insurance plan and retirement plan. Mondo defers to the applicable State or local law for paid sick leave eligibility
Senior Security Engineer
Cyber security analyst job in Columbus, OH
We are looking for a Senior Security Engineer to work for our client. The ideal candidate aligns with the responsibilities and qualifications outlined below.
Responsibilities:
Design, implement, and maintain security solutions to protect enterprise systems and data
Conduct vulnerability assessments, penetration testing, and risk analysis
Develop and enforce security policies, standards, and best practices
Collaborate with IT and development teams to integrate security into system architecture
Monitor and respond to security incidents, ensuring timely resolution
Qualifications:
5+ years of experience in cybersecurity engineering or related roles
Strong knowledge of network security, application security, and cloud security principles
Experience with security tools such as SIEM, IDS/IPS, and endpoint protection
Familiarity with compliance frameworks (ISO, NIST, SOC, HIPAA)
Excellent problem-solving and communication skills
What Our Client Offers:
A critical role in safeguarding enterprise systems and sensitive data
Opportunities to work with cutting-edge security technologies and methodologies
A collaborative environment focused on innovation and resilience
Competitive compensation and comprehensive benefits
Cloud Security Engineer
Cyber security analyst job in Philadelphia, PA
The Cloud Security Engineer will play a pivotal role in the cloud security service delivery model. The role combines deep technical expertise, collaboration across internal and external teams to design, implement, and optimize cloud security controls and service lines. The candidate will support both project-based and continuous security initiatives, focusing on securing HOSPITAL's cloud migration, supporting cloud security tool optimization, cloud security processes for the Information Security team, cloud/hybrid controls, automation, and risk-driven security outcomes.
Proven experience in securing a multi-cloud environment.
Proven experience with Identity and access management in the cloud
Proven experience with all security service lines in a cloud environment and the supporting security tools and processes to be successful.
Demonstrate collaboration with internal stakeholders, vendors, and supporting teams to design, implement, and maintain security technologies across network, endpoint, identity, and cloud infrastructure.
Drive continuous improvement and coverage of cloud security controls by validating alerts, triaging escalations, and working with the MSP to fine-tune detection and prevention capabilities.
Lead or support the development of incident response plans, engineering runbooks, tabletop exercises, and system hardening guides.
Ensure alignment of security architectures with HOSPITAL's policies, standards, and external frameworks such as NIST SP 800-53, HIPAA, PCI-DSS, CISA ZTMM, CIS Benchmarks, and Microsoft CAF Secure Methodology, AWS CAF, AWS Well Architected framework, Google CAF
Participate in design and governance forums to provide security input into infrastructure, DevSecOps, and cloud-native application strategies.
Assist with audits, compliance assessments, risk remediation plans, and evidence collection with internal compliance and external third-party stakeholders.
Mentor and support junior InfoSec engineers through documentation, training, and peer reviews.
Hands-on experience in security engineering, systems integration, and cloud architecture (Azure preferred).
Proficiency in tools and domains such as: EDR (Microsoft Defender), SIEM (Sentinel or Splunk), CSPM (e.g., Wiz), IAM (Entra ID), VPNs/NGFWs, NAC, and encryption protocols.
Demonstrated understanding of secure configuration management, automation pipelines (e.g., Terraform, PowerShell), and vulnerability management platforms.
What you will do
A Principal Information Security Specialist has similar responsibilities to Information Security Specialist III personnel. However, a Principal Information Security Specialist is deemed to be the subject matter expert and in-house advisor on complex problems and issues. A Principal Information Security Specialist also:
Works independently to initiate assignments and draws upon extensive professional knowledge and experience to make independent judgments regarding analysis, evaluation, development, and implementation of enterprise long-term solutions and operating initiatives to ensure that enterprise architectural objectives are aligned with organizational needs and strategic goals.
Skills: Duties (cont'd):
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of HOSPITAL DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
Skills:
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications, Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store HOSPITAL information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
OT Security Engineer
Cyber security analyst job in Collegeville, PA
Must have an OT background with life sciences experience
Deliver OT security firewall policy design and document
Investigate and deliver appropriate OT architectures for RD systems
Troubleshoot connectivity issues experienced during migration activities
Must be proficient in Palo Alto
Must have an OT background with life sciences experience
Knowledge of supporting technologies, Zscaler, Cisco network infrastructure, Azure, and Google cloud
Good to have
Experience using ServiceNow Preferred RD lab experience, knowledge of lab systems, such as LIMS. HPLC etc
Experience with project software (ADO) Generic US or UK based (US preferred)
Good communicator, role requires frequent conversations with the business
Note : If you are interested please share me your resumes to ********************* or else reach me at **********.
Information Security Specialist
Cyber security analyst job in Horsham, PA
Delta Information Systems, Inc. is seeking a highly skilled Information Security Specialist to protect and secure critical systems, data, and intellectual property in a fast-paced Aerospace & Defense environment.
This role is responsible for implementing and managing security controls, ensuring compliance with strict regulatory requirements, and defending against advanced cyber threats. The ideal candidate will bring deep technical knowledge, strong problem-solving skills, and the ability to work across teams to maintain the confidentiality, integrity, and availability of sensitive information that supports our national security mission.
This is a fully onsite position located in Horsham, PA.
Key Responsibilities
Implement, monitor, and maintain security tools, including firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM platforms.
Perform continuous monitoring, vulnerability assessments, penetration testing, and risk analysis of systems and networks.
Ensure compliance with DoD, NIST 800-171, CMMC, ITAR, DFARS, and other regulatory frameworks.
Champion the company's certification to CMMC Level 2.
Develop, document, and enforce cybersecurity policies, procedures, and incident response plans.
Support Government and customer security audits, preparing evidence and remediation plans as required.
Investigate and respond to cybersecurity incidents, performing root-cause analysis and recommending corrective actions.
Collaborate with IT, Engineering, Program Management, and Security teams to embed cybersecurity best practices into operations and product development.
Provide cybersecurity awareness training to employees with a focus on handling sensitive defense-related data.
Stay current on emerging cyber threats, nation-state tactics, and evolving compliance regulations impacting aerospace and defense.
Qualifications
Required:
Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience).
5+ years of experience in information security, IT security operations, or cybersecurity.
Strong knowledge of NIST 800-171, CMMC, and DFARS cybersecurity requirements.
Experience developing, implementing and achieving CMMC compliance.
Experience supporting DoD or government contracts with cybersecurity compliance needs.
Hands-on experience with security infrastructure: SIEM, IDS/IPS, endpoint security, and network monitoring tools.
Strong understanding of Windows, Linux, and cloud environments (Microsoft Office 365, Deltek Costpoint).
Excellent analytical, documentation, and communication skills.
U.S. Citizenship (required due to defense industry regulations).
Preferred:
Active security clearance (Secret or higher), or ability to obtain one.
Relevant certifications: CISSP, CISM, Security+, CEH, or GIAC.
Experience with RMF (Risk Management Framework) and STIG compliance.
Familiarity with secure software development, DevSecOps practices, or classified system security.
Compensation
Competitive salary
Outstanding benefits package
100% Paid Coverage for Medical, Dental, and Vision
401(k) Employer Match
Employee Stock Ownership Program (company funded)
Life Insurance (company funded)
Short-Term Disability (company funded)
Long-Term Disability (company funded)
Vacation & Sick
Holidays: 11 days
HealthCare FSA
Dependent Care FSA
What We Offer
Opportunities for training, certifications, and career growth.
A mission-driven culture where your work contributes to national security.
Exposure to advanced technologies and programs critical to the aerospace and defense sector.
About Delta Information Systems, Inc.
Delta Information Systems (DIS) is an industry-leading supplier of high-quality aerospace telemetry products for Flight Test, Missile Test, Range Safety, Launch Support and Satellite Command and Control applications. Their products address the complete telemetry chain from Data Acquisition, Storage, Transport and Distribution to Telemetry Processing and Display. DIS customers include all DoD entities, all Major Primes, Integrators, Gov Labs, Aircraft & Missile Manufacturers, & Launch Facilities.
In addition, Delta Information Systems (DIS) designs and develops sophisticated electronic equipment that is specifically designed to reliably operate in harsh environments. They deliver critical video communications capability for manned and unmanned Intelligence, Surveillance and Reconnaissance (ISR) programs.
Cloud Security Engineer
Cyber security analyst job in Philadelphia, PA
Our client is one of the largest Hospitals in the US. Based out of Philadelphia, they are looking to hire a Cloud Security Engineer on a Contract basis.
Contract Duration: 6 Month Contract (Potential for extension or conversion)
Required Skills & Experience
At least twelve (12) years industry related experience, including experience in one to two IT disciplines (such as technical architecture, network management, application development, middleware, information analysis, database management or operations) in a multitier environment.
CISSP Certification
At least six (6) years experience with information security, regulatory compliance and risk management concepts.
At least three (3) years experience with Identity and Access Management, user provisioning, Role Based Access Control, or control self-assessment methodologies and security awareness training.
Experience with Cloud and/or Virtualization technologies.
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications,
Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Daily Responsibilities
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
You will receive the following benefits:
Medical Insurance - Four medical plans to choose from for you and your family
Dental & Orthodontia Benefits
Vision Benefits
Health Savings Account (HSA)
Health and Dependent Care Flexible Spending Accounts
Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance
Hospital Indemnity Insurance
401(k) including match with pre and post-tax options
Paid Sick Time Leave
Legal and Identity Protection Plans
Pre-tax Commuter Benefit
529 College Saver Plan
Motion Recruitment Partners (MRP) is an Equal Opportunity Employer. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under MRP's Employment Accommodation policy. Applicants need to make their needs known in advance.
Cloud Security Engineer - SRE
Cyber security analyst job in Columbus, OH
Job Posting Title: Cloud Security Engineer - SRE
We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation.
Technical Skills
• Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling.
• Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations.
• Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure.
• Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions.
• Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift).
• Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs.
• Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs.
• Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI.
• A strong understanding of HashiCorp Vault and Terraform will make you stand out.
2. Problem-Solving and Troubleshooting
• Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews.
• Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error.
• Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications.
3. Collaboration and Communication
• Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams.
• Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports.
• Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences.
4. Reliability and Scalability
• Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability.
• Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands.
• Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime.
5. Security and Compliance
• Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices.
• Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry.
Minimum Job Qualifications:
• Bachelor degree in business or equivalent work experience
• 10 years of previous program leadership and/or relevant consulting experience
• Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle
• 5+ years' experience in driving large scale data center consolidation efforts
• Minimum 5 years' experience with matrix management of cross-functional processes and teams
• Proficient with Project Management tools
Product Security Engineer
Cyber security analyst job in Cleveland, OH
We are looking for a Contract Product Security Engineer to support vulnerability management initiatives within a product security organization. This role is ideal for a security professional who enjoys hands-on analysis, structured problem-solving, and improving security processes through automation and collaboration. You will work closely with engineering and security teams to help identify, assess, and prioritize security risks across software components.
The focus of this project is vulnerability management through Software Bill of Materials (SBOM) analysis. The engineer will review and triage vulnerabilities identified by SBOM scanning tools, assess risk and severity, and support remediation efforts in partnership with cross-functional teams. The role also includes enhancing vulnerability management workflows through scripting and automation, as well as maintaining clear documentation to ensure traceability and compliance within a structured development environment.
What we offer you in USA
We honor the contract terms you prefer.
20 paid vacation days per year
40 working hours per week
Retirement Plan 401(K)
Medical, Dental, Vision Insurance Plan for you and your Family
100% On-Site position in Newton
Responsibilities
Review, analyze, and triage vulnerabilities from SBOM scanning tools
Assess severity and support risk-based prioritization of remediation
Collaborate with engineering, security, and product teams to drive resolution
Track vulnerability status for timely closure
Develop or use scripts/automation to improve vulnerability management
Maintain clear documentation of findings and actions
Requirements
Experience in product security
Proficiency in Python or other scripting languages
Strong analytical skills and attention to detail
Effective collaboration with cross-functional teams
Nice to Have
Experience with vulnerability management programs
Exposure to regulated industries
Familiarity with SBOM management tools (e.g., Dependency Track)
Information Security Engineer - Infrastructure & Compliance(Only w2)
Cyber security analyst job in King of Prussia, PA
Minimum Experience: 10+ Years
Key Responsibilities
Security & Compliance
Serve as divisional lead for NIST 800-171 control alignment, tracking, and remediation.
Partner with Internal Audit and Enterprise Security to review non-compliance findings and drive resolution.
Maintain and improve Defender for Cloud posture management across Azure infrastructure.
Identify, prioritize, and remediate vulnerabilities across infrastructure, networks, and systems.
Develop and implement Linux patch management strategy and compliance reporting.
Contribute to policy documentation and control evidence collection for SOX and NIST readiness.
Infrastructure & Cloud Security Operations
Work closely with Infrastructure, Cloud Ops, and Application teams to assess risk and prevent operational disruption.
Integrate security best practices into Azure, network, and datacenter operations.
Utilize Defender, Azure Security Center, and related tools to monitor and report on environment health.
Coordinate with Cloud and Systems Engineers to validate patch success, compliance metrics, and configuration baselines.
Automate recurring security validation and compliance tasks using scripting (PowerShell, Python, Bash).
Governance, Reporting, and Training
Maintain centralized tracking for security initiatives, audit remediations, and policy adherence.
Partner with PMs to ensure remediation workstreams are integrated into project schedules.
Support KnowBe4 phishing campaign analysis and contribute to security awareness reinforcement.
Report key risk indicators (KRIs) and compliance metrics to leadership.
Required Qualifications
8 years of experience in Information Security, Infrastructure Engineering, or Cloud Operations.
Proven experience with Defender for Cloud, Azure Security Center, or equivalent platforms (e.g., Tanium, Nessus, Qualys).
Working knowledge of NIST 800-171, NIST CSF, or ISO 27001 frameworks.
Experience managing patching and vulnerability remediation across Windows and Linux environments.
Proficiency with scripting or automation tools (PowerShell, Python, Bash).
Familiarity with Active Directory, Azure AD, and network security principles.
Preferred Qualifications
Experience with Fortify or similar static code analysis tools.
Familiarity with KnowBe4, VRX, or patch compliance tracking systems.
Exposure to Azure DevOps, IaC, and configuration-as-code methodologies.
Security or cloud certifications (e.g., AZ-500, Security+, CISSP, or equivalent).
Success Measures
Reduction in open audit findings and non-compliant controls.
Establishment of measurable Linux and infrastructure patch compliance reporting.
Defender for Cloud secure score improvement over baseline.
Defined and repeatable NIST alignment process for divisional systems.
Improved coordination between Infrastructure, Cloud, and Security teams during vulnerability remediation.
If I missed your call ! Please drop me a mail.
Thank you,
Harish
Accounts Manager/Talent Acquisition
Astir IT Solutions, Inc - An E-Verified Company
Email:*******************
Direct : ***********788
50 Cragwood Rd. Suite # 219, South Plainfield, NJ 07080
***************
Security Incident Response Engineer III
Cyber security analyst job in Philadelphia, PA
Are you considering a new role in Cyber Security and want to work in a company that is helping to change the world? Consider joining an organization serving the global scientific research community, supporting the brightest minds on the planet.
Are you a collaborative Incident Response Engineer looking to work for a mission driven global organization?
About the role, Elsevier is expanding its Global InfoSec Security Incident Response team. As a Security Incident Response Engineer, you will play a crucial role in our internal security support team, assisting with incident response investigations.
This team is entrusted with analyzing, triaging, scoping, containing, and providing guidance for remediation, as well as determining the root cause of security incidents. This team also is empowered by collecting and analyzing security incident-related data to identify indicators of attack and compromise.
Responsibilities:
Assisting in scoping security incidents and identifying indicators of attack and compromise.
Analyzing incident data from threat analytics tools.
Communicating recommendations and guidance based on security incident analysis.
Coordinating responses to security incidents with other security and consulting teams.
Developing, documenting, and implementing runbooks, capabilities, and techniques for Incident Response.
Performing security triage and analysis on endpoint, server, and network infrastructure.
Conducting activities necessary for immediate containment and short-term resolution of incidents.
Maintaining current knowledge of the threat landscape, emerging security threats, and vulnerabilities.
Investigating the root cause of complex security incidents.
Maintaining a high level of confidentiality.
Requirements
Possess experience in cybersecurity incident response or related fields.
Proven ability to analyze, triage, scope, contain, and remediate security incidents.
Have current and extensive knowledge of security technologies, tools, and processes.
Experience with major cloud providers, including cloud security, networking, and multi-cloud or hybrid deployments.
Have current skills in automation using PowerShell, Python, Java, or similar languages.
Experience in Linux and/or Mac administration. Experience in Network Security Administration or Systems Administration.
Experience supporting large, complex, and geographically distributed enterprise environments.
Preferred certifications: CISSP, CISM, SANS, GIAC, ethical hacking/penetration tester, or security risk assessment.
Elsevier employs 10,000 people worldwide, including over 2,500 technologists. We have supported the work of our research and health partners for more than 140 years. Growing from our roots in publishing, we offer knowledge and valuable analytics that help our users make breakthroughs and drive societal progress.
Senior Information Security Analyst
Cyber security analyst job in Westerville, OH
Salary: 105K-125K w/ 5-10% bonus
Must Haves :
- Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field (Master's degree preferred).
- Minimum of 5-7 years of experience in cybersecurity or information security roles, preferably in a manufacturing or construction environment.
- Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+ are highly desirable.
- Strong knowledge of network protocols, firewalls, intrusion detection/prevention systems, and encryption technologies.
- Experience with security tools such as Splunk, CrowdStrike, Cisco Umbrella, Artic Wolf, or similar platforms.
- Proficiency in cloud security (e.g., AWS, Azure) and securing industrial control systems (ICS) is a plus.
- Familiarity with scripting languages (e.g., Power BI, Python, PowerShell) for automation and analysis.
Job Summary
The Senior Cybersecurity/Information Security Analyst will be responsible for overseeing all aspects of information security within the organization. This role involves designing, implementing, and monitoring security measures to protect systems, networks, and data from cyber threats. The ideal candidate will have extensive experience in cybersecurity, working with security SaaS providers, a proactive approach to identifying vulnerabilities, and the ability to collaborate across departments to ensure a secure enterprise environment.
Key Responsibilities
- Develop, implement, and maintain comprehensive information security policies, standards, and procedures.
- Ensure alignment with industry standards such as NIST, CIS, and other relevant frameworks.
- Work with SaaS providers in conducting regular risk assessments and audits to identify vulnerabilities and ensure compliance with regulatory requirements.
- Oversee SaaS provider monitor of networks and systems for security breaches, intrusions, and unusual activity using advanced security tools (e.g., SIEM, IDS/IPS).
- Lead incident response efforts, including investigation, containment, remediation, and documentation of security incidents.
- Perform root cause analysis and implement corrective actions to prevent recurrence.
- Review and contribute to the configuration and maintenance of firewalls, VPNs, endpoint protection, and other security technologies.
- participate in regular vulnerability scans and penetration testing to identify and mitigate risks.
- Ensure secure configuration of cloud, on-premises, and hybrid environments.
- review and recommend cybersecurity training programs to educate employees on best practices and emerging threats.
- Promote a culture of security awareness across the organization.
- Ensure compliance with applicable laws, regulations, and industry standards (e.g., CMMC, NIST, CIS, PCI-DSS).
- Prepare and present reports on security posture, incidents, and compliance to the Manager of Cyber/Information Security and senior leadership.
- Collaborate with IT, operations, and other departments to integrate security into business processes and systems.
- Provide guidance and mentorship to junior members of the cybersecurity team.
- Stay current on emerging threats, technologies, and best practices to recommend improvements to the security program.
Cyber Security Analyst/Implementation Specialist
Cyber security analyst job in Columbus, OH
Responsibility for information cyber security analysis & response with the mission of protecting the firm from internet attacks / threat actors. Lead initiatives and the implementation of capabilities in order to advance the Cyber Threat program Enhance and distribute security incident response and escalation procedures to ensure timely and effective handling of security events and alerts
Apply knowledge of technical, analytical skills to ensure the confidentiality, integrity, and availability of all information systems assets and ensure compliance with company policies, procedures, contractual, and regulatory requirements.
A solid understanding of Penetration Testing, Vulnerability Management, Threat Vector Analysis, Intrusion Detection and Prevention, Incident Management and Response, Web Application Security, Risk Assessment and Mitigation methodologies, and Counter Threat Operations.
Qualifications
Cyber Security Analyst/Implementation Specialist - need someone that has broad cyber security knowledge that can not only recommend solutions, but more importantly also has experience implementing/managing those solutions.
MUST HAVE JAVA DEVELOPMENT BACKGROUND
Need solid remediation experience - how to remediate vulnerabilities in a web application
CISSP certification is nice to have, not mandatory
Additional Information
Job Status: Contract to Hire
Eligibility: EAD Green Card/ Green Card/ US Citizens
Share the Profiles to *********************
Contact:
************
Keep the subject line with Job Title and Location
Easy ApplyCyber Incident Response Tier III Analyst
Cyber security analyst job in Martinsburg, WV
PingWind is seeking a Cyber Incident Response Tier III Analyst to support our VA customer at Hines, IL Martinsburg, WV, or Austin, TX. Required Clearance: Ability to obtain Tier 4 / High Risk Background Investigation
Certifications: Must currently have or be willing to obtain one of the following certifications (or equivalent):• GIAC Certified Incident Handler• EC-Council's Certified Incident Handler (ECIH)• GIAC Certified Incident Handler (GCIH)• Incident Handling & Response Professional (IHRP)• Certified Computer Security Incident Handler (CSIH)• Certified Incident Handling Engineer (CIHE)• EC-Council's Certified Ethical Hacker
Required Education
• Bachelor's degree in computer science, Cybersecurity, Information Technology, or a related field (or equivalent work experience)
Required Experience:
• 5+ years of experience supporting incident response in an enterprise-level Security Operations Center (SOC) Responsibilities
• In-depth forensics and root cause analysis for alerts and incidents• Handling Tier 2 ticket escalations by performing forensic root cause analysis and delivering actionable remediation recommendations and or appropriate next steps.• Perform post incident analysis to ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned.• Work with Watch Officers and Team Leads on a bridge to function as SME for major incidents.• Updating playbooks based on findings of the incident trends and outcomes of auditing tasks.• Develop and operationalize advanced security analytic use cases to detect and respond to sophisticated cyber threats in real-time• Create dashboards/reports based on these trends or searches to provide clarity of information being defined.• Interface with the Cyber Detection Analytics (CDA) Team to recommend tuning based on findings.• Support mentoring and training of junior analysts on alerts, playbooks, and tools.• Stay informed of latest cybersecurity threats and best practices.• Perform real-time monitoring and triage of security alerts in Cybersecurity toolsets including SIEM, and EDR• Make accurate determination of what alerts are false positives or require further investigation and prioritization • Lead and actively participate in the investigation, analysis, and resolution of cybersecurity incidents. Analyze attack patterns, determine the root cause, and recommend appropriate remediation measures to prevent future occurrences• Ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned. Collaborate with knowledge management teams to maintain up-to-date incident response playbooks• Collaborate effectively with cross-functional teams, including forensics, threat intelligence, IT, and network administrators. Clearly communicate technical information and incident-related updates to management and stakeholders• Identify and action opportunities for tuning alerts to make the incident response team more efficient • Monitor the performance of security analytics and automation processes regularly, identifying areas for improvement and taking proactive measures to enhance their efficacy• Leverage Security Orchestration, Automation, and Response (SOAR) platforms to streamline and automate incident response processes, including enrichment, containment, and remediation actions• Support the mentoring and training of more junior IR staff• Stay informed about the latest cybersecurity threats, trends, and best practices. Actively participate in cybersecurity exercises, drills, and simulations to improve incident response capabilities
Requirements
• Work 100% on-site Tuesday through Saturday from 3:00 PM to 11:00 PM• A deep understanding of cybersecurity principles, incident response methodologies, and a proactive mindset to ensure our SOC operates effectively in a high-pressure environment• Strong experience with security technologies, including SIEM, IDS/IPS, EDR, and network monitoring tools• Experience with enterprise ticketing systems like ServiceNow• Excellent analytical and problem-solving skills• Ability to work independently and in a team environment to identify errors, pinpoint root causes, and devise solutions with minimal oversight• Ability to learn and function in multiple capacities and learn quickly• Strong verbal and written communication skills
Preferred Qualifications
• Ability to investigate Indicators of Compromise (IOCs) using Splunk by correlating logs from multiple sources to detect, trace, and assess threat activity across the enterprise• Experience leveraging Microsoft Defender for Endpoint (MDE) to perform endpoint investigations, analyze process trees, and validate IOCs during active threat scenarios• Ability to remediate phishing incidents, including analysis of email headers, links, and attachments, identifying impacted users, and executing containment actions such as user lockouts, email quarantine, and domain blacklisting• Experience performing root cause analysis of malware leveraging PowerShell, using tools such as MDE advanced hunting (KQL) and Splunk to identify infection paths, attacker behavior, and persistence mechanisms
About PingWind
PingWind is focused on delivering outstanding services to the federal government. We have extensive experience in the fields of cyber security, development, IT infrastructure, supply chain management and other professional services such as system design and continuous improvement. PingWind is a VA CVE certified Service-Disabled Veteran Owned Small Business (SDVOSB) and SBA HUBZone Certified with offices in Washington DC and Northern Virginia. ****************
Our benefits include:
• Paid Federal Holidays• Robust Health & Dental Insurance Options• 401k with matching• Paid vacation and sick leave• Continuing education assistance• Short Term / Long Term Disability & Life Insurance• Employee Assistance Program • through Sun Life Financial EAP Guidance Resources
Veterans are encouraged to apply
PingWind, Inc. does not discriminate in employment opportunities, terms and conditions of employment, or practices on the basis of race, age, gender, religious or political beliefs, national origin or heritage, disability, sexual orientation, or any characteristic protected by law
Auto-ApplyCyber Security Analyst
Cyber security analyst job in Clarksburg, WV
The Cyber Security Analyst supports a federal agency in monitoring networks for breaches, leading incident response, performing risk and vulnerability assessments, and develop and implement security policies and best practices. The Cyber Security Analyst analyzes security data from sources like SIEMs and firewalls, coordinating with other teams on compliance issues, and recommending security enhancements to safeguard confidentiality, integrity, and availability to meet the needs and support the missions of the agency.
Required Responsibilities/Duties:
Lead the investigation, containment, and remediation of security incidents.
Perform risk assessments, analyze vulnerabilities using Tenable Nessus, and coordinate remediation activities
Monitor networks for security breaches, analyze logs from various sources (e.g., firewalls, SIEMs), and look for indicators of compromise.
Create and improve security standards, best practices, incident response plans, and disaster recovery plans.
Prepare reports on security metrics, attempted attacks, and breaches. Communicate findings and risks to stakeholders and management.
Maintain and administer security tools like firewalls and intrusion detection systems. May assist with tuning and testing detection rules.
Identifies potential areas of information security compliance vulnerability and risk, develops and implements corrective action plans for resolution of problematic issues, and provides general guidance on how to avoid or deal with similar situations in the future.
Develops and periodically reviews and updates information security policies, procedures, and associated documentation to ensure continuing currency and relevance in providing guidance to management and employees regarding regulatory compliance.
Provides reports on a regular basis, and as directed or requested, to keep customer stakeholders informed of the operation and progress of compliance efforts.
Acts as an independent reviewer and evaluator to ensure that compliance issues and concerns within the institution are being appropriately evaluated, investigated, and resolved.
Communicates the results of risk assessments to stakeholders in non-technical terms so effective decisions can be made to ensure the safety and security of data subject to government regulation.
Executes responsibilities outlined in the Information Security Incident Response Plan to appropriately contain, investigate, remediate, and report information security incidents.
Qualification
Active Top-Secret clearance with capability to obtain SCI/CI Poly if needed to meet contract requirements.
Bachelors and/or Master's degree in Computer Science, Management Information Systems, or related computer science technical degree
CompTIA Security+ or higher certification
2 years of relevant experience with the following:
Vulnerability scanning tools (specifically Tenable Nessus)
Tenable administration
About E-INFOSOL
E-INFOSOL is a Service Disabled and Veteran Owned Small Business (SDVOSB) located in the Washington, D.C. metropolitan area. We specialize in building modern and tailored solutions to support our customers' mission. As a mission-first organization, we deliver Subject Matter Expertise (SME) in cloud computing, virtualization, cyber security, software development and data services. We support the Intelligence Community, Department of Defense, Federal Law Enforcement, Civilian Agencies and the Private Sector.
Through strategic partnerships with top industry players such as Amazon Web Services (AWS), VMware, Microsoft and Nutanix, E-INFOSOL provide an array of IT products and solutions. Combined with our industry expertise, we deliver in-depth knowledge on Government requirements and fully understand NIST and DoD security requirements. Our expertise in the latest technologies combined with our understanding of infrastructure needs and security requirements provides the best combination for achieving innovative and secure environments for Government Agencies and Private Sector.
Career Growth
“Putting People First, Achieving our Mission Together”. E-INFOSOL is a people-first organization focusing on a positive employee culture that inspires creativity and innovation in support of our customers. With opportunities such as reimbursement and bonuses based on completion of certifications, we invest in our employees' career growth.
Benefits
Medical - 100% company paid premiums for employees with dependent options.
Dental and Vision
Retirement Savings (401k) up to 4% match
Health Savings Account (HSA), FSA and DCFSA
Company-paid Short/Long-term disability (w/ additional supplemental options)
Company-paid Life and AD&D (w/ additional supplemental options)
Generous Paid Time Off and ALL 11 Federal Holidays
Legal and Identity Protection Services
Bonuses for certifications and reimbursement
Employee Perks:
UberOne, Company Outings (Sporting events, Happy Hours, etc.), Discounts on services including Pet Insurance
Company Awards
SBA 8(a) Certified
SDVOSB
GSA Contract Holder
Inc. 5000
Equal Employment Opportunity Policy
E-INFOSOL LLC provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
Website: E-INFOSOL.com
Auto-ApplyEntry Level Cyber Security Analyst
Cyber security analyst job in Dayton, OH
":"As an Entry Level Cyber Security Analyst, you will become a part of an elite team of individuals committed to the security of Customer information and the Company's intellectual property. You will manage the various security tools to identify and evaluate complex business and technology risks.
You must also be able to communicate your findings and recommendations for management.
You will work with teams across the organization including partnering with IT and Software Development on security related matters.
If you are an innovative problem solver in technology who enjoys working in a team environment, this is the position for you! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Entry Level Cyber Security Analyst","date":"2025-11-22","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Bachelor's degree, certificate, or boot camp in CIS, IT, or Cyber Security related fields a plus~^~Linux and Windows operating systems experience and knowledge required~^~Excellent oral and written communication skills~^~Industry standard certifications a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance.
We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off.
At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center.
We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation.
Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment.
Reynolds and Reynolds is an equal opportunity employer.
","
Computer Network Defense (CND) Analyst
Cyber security analyst job in Columbus, OH
Job DescriptionDescription:
Responsibilities:
Performs actions to protect, monitor, detect, analyze and respond to unauthorized activity within assigned information systems and computer networks. Employs Cybersecurity capabilities and deliberate actions to respond to a CND alert or emerging situational awareness/threat. Serves as an expert on CND requirements and compliance to such requirements by using IA tools and techniques to perform compliance analysis and correlation, tracking and remediation, coordination and escalating CND non-compliance. Provides technical analysis and sustainment support for the enterprise for IA tools and applications, and assists with the application of Defense-In-Depth signatures and perimeter defense controls to diminish network threats.
Requirements:
Required Experience:
Five (5) years of relevant experience or related formal education
Two (2) years of experience performing root cause analysis of cybersecurity events and incidents
Two (2) years of experience analyzing network traffic and/or system logs
Understanding of Defense -in-Depth
Must possess written and verbal skills to appropriately document and brief Cybersecurity Incidents
Working knowledge of at least two cybersecurity areas: Firewall, IDS/IPS, Host based antivirus, Vulnerability Management, Forensics, Malware Analysis, and or Device Hardening
Minimum Requirements:
Must possess DOD Top Secret Clearance and be eligible for SCI and IT-I access
DoD Approved 8570/8140 Baseline Certification: Category IAT Level II such as Sec + CE
DoD Approved 8570/8140 Baseline Certification: CSSP- IR such as, CEH, CCNA-Security, CCNA Cyber Ops, etc
Ability to build and read scripts in languages such as Perl, Bash, Powershell, Ruby, Python
Connected Logistics respects the need for confidentiality for all applicants.
Connected Logistics offers an excellent benefits package that includes health, dental, vision, life and disability insurance, a great 401(k) package, and generous Paid Time Off.
EQUAL OPPORTUNITY EMPLOYER. It is our policy to abide by all federal, state and local laws prohibiting employment discrimination solely on the basis of a person's race, religious creed, color, national origin, ancestry, physical disability, mental condition (including, but not limited to, cancer related or HIV related), marital status, sex, gender (including sex stereotyping), age, sexual orientation, military status, or any other protected status except where a reasonable, bona fide occupational qualification exists
Jr. Information Security Analyst (Controls Testing)
Cyber security analyst job in Malvern, PA
At Customers Bank, we believe in working hard, working smart, working together to deliver memorable customer experiences and having fun. Our vision, mission, and values guide us along our path to achieve excellence. Passion, attitude, creativity, integrity, alignment, and execution are cornerstones of our behaviors. They define who we are as an organization and as individuals. Everyone is encouraged to have personal development plans. By doing so, our team members are on their way to achieve their highest potential and be successful in their personal and professional lives.
This role is required to be ONSITE in Malvern, PA Monday through Thursday with Friday remote.
Must be eligible to work in the U.S. without requiring sponsorship now or in the future.
Who is Customers Bank?
Founded in 2009, Customers Bank is a super-community bank with over $22 billion in assets. We believe in dedicated personal service for the businesses, professionals, individuals, and families we work with.
We get you further, faster.
Focused on you: We provide every customer with a single point of contact. A dedicated team member who's committed to meeting your needs today and tomorrow.
On the leading edge: We're innovating with the latest tools and technology so we can react to market conditions quicker and help you get ahead.
Proven reliability: We always ground our innovation in our deep experience and strong financial foundation, so we're a partner you can trust.
What you'll do:
* Control Testing & Evaluation: Assist in definition of and execute testing procedures to assess the design and effectiveness of key internal controls across business units, technology, and operational processes.
* Risk & Compliance Alignment: Ensure testing activities are aligned with regulatory standards (SOX, FFIEC, FDIC, etc.) and internal policies.
* Issue Identification & Reporting: Document test results, identify control deficiencies, and provide clear recommendations for remediation.
* Collaboration: Work closely with business process owners, auditors, compliance, and risk teams to ensure timely resolution of identified issues.
* Process Improvement: Recommend enhancements to testing methodologies, control design, and risk management practices to strengthen the bank's control environment. Maintain awareness of industry regulatory environment and threat landscape.
* Documentation & Communication: Prepare executive-ready reports, dashboards, and presentations for senior management and regulators, and information technology peers.
* Continuous Monitoring: Participate in ongoing monitoring and follow-up activities to confirm remediation effectiveness and sustainability.
What do you need?
* Must-Haves
* 3+ years of experience in internal audit, compliance testing, risk management, or internal controls.
* Strong knowledge of information security and IT risk control frameworks (e.g., COSO, COBIT, NIST).
* Understanding of financial, operational, and IT control environments.
* Strong analytical skills with attention to detail and accuracy.
* Excellent written and verbal communication skills with the ability to present complex findings clearly.
* Bachelor's degree in information systems, or related field.
* Key Skills
* Risk and control assessments in highly regulated environments
* Understanding of information technology infrastructure (networking, Active Directory, backups, etc.)
* Process analysis and documentation.
* Strong interpersonal skills to work across departments.
* Proficiency with Microsoft Office applications (Excel, Word, PowerPoint).
* Develop and maintain working relationships with audit, GRC, and IT teams to promote continuous control awareness and improvements.
* Nice-to-Haves
* Professional certifications such as CIA, CISSP, CISA, Microsoft certifications, or CRMA.
* Experience with GRC (Governance, Risk, and Compliance) tools.
* Banking or financial services industry experience
Customers Bank is an equal opportunity employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
We also provide "reasonable accommodations", upon request, to qualified individuals with disabilities, in accordance with the Americans with Disabilities Act and applicable state and local laws.
Diversity Statement:
At Customers Bank, we believe in working smart, working together, and having fun while delivering innovative solutions and memorable experiences for our customers. We are committed to the continual advancement of a culture which reflects the value we place on diversity, equity, and inclusion. We honor the diverse experiences, perspectives, and identities of our team members, and we recognize that it is their passion, creativity, and integrity that drives our success. Step into your future with us! Let's take on tomorrow.
Auto-ApplyInformation Security Analyst 2
Cyber security analyst job in New Bremen, OH
: Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership.
**Information Security Analyst 2**
**Job Duties**
+ Governance, Risk, & Compliance (GRC) Application Subject Matter Expert - Operate and maintain Company's Governance, Risk and Compliance (GRC) platform, its libraries, reports, portals, and data integrations to effectively support operations, data accuracy and user processes. Serve as the primary liaison for GRC software vendors, by maintaining contact with vendor representatives, submitting troubleshooting tickets and software feedback to improve the user experience. Support Company's Enterprise Risk Management, Compliance, Vendor Management, Business Continuity Planning, Information Technology and Security, Project Management and Audit Programs with data entry, maintenance, and configuration. Develop, maintain, and distribute custom and ad hoc reporting of risk data including taxonomy analytics and Key Risk Indicators (KRI's).
+ Security Architecture & Control Design - Develop/integrate cybersecurity designs for systems and networks for the processing of company data. Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements. Ensure that acquired or developed systems and architectures are consistent with company's cybersecurity architecture guidelines.
+ Risk Assessment - Coordinate external risk assessments including audits, gap assessments, and penetration testing to evaluate security architectures and designs to determine the adequacy of security design and architecture. Determine protection needs (i.e., security controls) for company's information processing and document appropriately. Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
+ Incident Response Communication- Coordinate communication and information sharing aspects of incident response. Draft messages and updates to internal and external audiences for Incident Response Team (IRT) review, such as employees, customers, partners, media, or public. Handle crisis management issues and provides guidance and education on incident prevention and response best practices. Perform other duties as assigned.
**Minimum Qualifications**
+ 2-4 years related experience
+ Associate's degree (Information Technology, Cyber Security, Computer Science)
+ Non-degree considered if 6+ years of related experience along with a high school diploma (GED)
**Preferred Qualifications**
Intermediate knowledge of various Information Security & Privacy Frameworks such as the Secure Controls Framework, NIST CSF, NIST 800-171, NIST 800-53, NIST Privacy Framework, ISO-27001, ISO-27701, GDPR, US & other global privacy regulations. Work experience in other Information Technology disciplines such as software development, help desk, networking, systems administration or similar in conjunction with professional certifications such as CASP+, CISSP Associate, or AWS Associate Level Certifications. Intermediate level of knowledge in at least one scripting or software development language such as PowerShell, Bash, Java, or Python. Good written and oral communication skills, deductive reasoning, and analytical investigative skills. Good interpersonal skills to facilitate positive relations between business groups. Requires excellent verbal and written communication skills, as well as a knowledge of company's culture and values.
**Work Authorization:**
Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire.
No agency calls please.
**Compensation and Benefits:**
Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more.
EOE Veterans/Disabilities
Information Security Expert
Cyber security analyst job in Columbus, OH
Title: Information Security SME/Developer with .NET development Duration : 5 Months contract (High possibility of Extension) Interview Type: Both iLinc Web Cam and In Person Interview Skills Required Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
.NET development experience Required 5 Years
Thanks
Naimesh Solanki
Sr. Technical Recruiter
Phone: ************ x 6578
Qualifications
Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
Additional Information
All your information will be kept confidential according to EEO guidelines.