Post job

Cyber security analyst jobs in Topeka, KS

- 229 jobs
All
Cyber Security Analyst
Security Engineer
Information Security Engineer
Information Security Analyst
Cyber Security Engineer
Security System Engineer
Network Security Analyst
Senior Security Analyst
Defense Analyst
Information Assurance Engineer
Senior Security Engineer
Data Security Analyst
Senior Cyber Security Analyst
Cyber Security Specialist
  • Cyber Defense Forensics Analyst

    EY 4.7company rating

    Cyber security analyst job in Topeka, KS

    At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all. The exceptional EY experience. It's yours to build. EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities. Today's world is fuelled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. **The opportunity** Cyber Triage and Forensics (CTF) Incident Analyst will work as a senior member of the technical team responsible for security incident response for EY. The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identify indicators of compromise, support remediation or coordinate remediation efforts of a security incident, and develop documentation to support the security incident response process. **Your key responsibilities** + Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified + Forensically analyze end user systems and servers found to have possible indicators of compromise + Analysis of artifacts collected during a security incident/forensic analysis + Identify security incidents through 'Hunting' operations within a SIEM and other relevant tools + Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including: obtaining access to systems, digital artifact collection, and containment and/or remediation actions + Provide consultation and assessment on perceived security threats + Maintain, manage, improve and update security incident process and protocol documentation + Regularly provide reporting and metrics on case work + Resolution of security incidents by identifying root cause and solutions + Analyze findings in investigative matters, and develop fact based reports + Be on-call to deliver global incident response **Skills and attributes for success** + Resolution of security incidents by identifying root cause and solutions + Analyze findings in investigative matters, and develop fact-based reports + Proven integrity and judgment within a professional environment + Ability to appropriately balance work/personal priorities **To qualify for the role you must have** + Bachelors or Masters Degree in Computer Science, Information Systems, Engineering or a related field + 5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering; + Understanding of security threats, vulnerabilities, and incident response; + Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis; + Be familiar with legalities surrounding electronic discovery and analysis; + Experience with SIEM technologies (i.e. Splunk); + Deep understanding of both Windows and Unix/Linux based operating systems; **Ideally, you'll also have** + Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH + Background in security incident response in Cloud-based environments, such as Azure + Programming skills in PowerShell, Python and/or C/C++ Understanding of the best security practices for network architecture and server configuration **What we look for** + Demonstrated integrity in a professional environment + Ability to work independently + Have a global mind-set for working with different cultures and backgrounds + Knowledgeable in business industry standard security incident response process, procedures, and life cycle + Excellent teaming skills + Excellent social, communication, and writing skills **What we offer you** The compensation ranges below are provided in order to comply with United States pay transparency laws. Other geographies will follow their local salary guidelines, which may not be a direct conversion of published US salary range/s. At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more . We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being. **Are you ready to shape your future with confidence? Apply today.** EY accepts applications for this position on an on-going basis. For those living in California, please click here for additional information. EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities. **EY | Building a better working world** EY is building a better working world by creating new value for clients, people, society, and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy, and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories. EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law. EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at ************************** .
    $105.2k-186.4k yearly 60d+ ago
  • CI Cyber Threat Analyst IV

    Techguard Security 3.6company rating

    Cyber security analyst job in Saint Louis, MO

    Assignment Overview: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted within established time frames. will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements: Duties: Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable): Threat data collected and reported by NGA Technical CI team and network security personnel. Intelligence reported by the Intelligence Community. Fusion of all source threat analysis derived from multiple intelligence sources (INTs). Imagery when available. Information that can be used to inform security decisions. Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include: Compilation of data collected and reported in weekly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decision makers. Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include: Compilation of data collected and reported in weekly and monthly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decisions. Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include: Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products. Raw and finished Intelligence reported by Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA. Produce IIRs from data collected and reported by either the Technical CI team, NGA cyber security personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires: Coordination with teammates and stakeholders to ensure accuracy of reported information. Cross referencing local information reporting with Intelligence Community reporting. Clear and concise writing to briefly convey threat. Responsiveness to Intelligence Community priority collections requirements. Timeliness. Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE, or Criss Cross). Provide Technical CI advise and expertise in support of CI inquiries, operations and issues. Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners. Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers. Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner. Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages. Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats). Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards. Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing. Display an ability to collaborate with internal NGA and external IC/Cyber community members. Coordinate CI Cyber activities originating from Enterprise Incident Response Events. Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission. Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures. Skills and Experience Required: Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations. Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level. Desired: Be a credentialed graduate of an accredited federal or DoD CI training academy. Possess a Bachelor's degree in Science, Technology, Engineering, or Mathematics disciplines. Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines. Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov. Experience translating Government vision into understandable and achievable measures. Experience in using supervisory skills to coach teammates to achieve objectives. Monitor and track progress toward achievable measures.
    $69k-91k yearly est. 60d+ ago
  • Cyber Security Training

    Kanshe Infotech

    Cyber security analyst job in Omaha, NE

    Kanshe Infotech - Houston, TX Kanshe Infotech is committed and noticed in the Information Technology industry as a company with exceptional talent and expertise in the area of software development and solutions. The company is formed by a group of people with extensive industry experience and wide ranging domain expertise with a vision to create a cost effective, high value solution provisions comparable to the big consulting companies. The mission of our company is to be an industry leader by offering innovative technology solutions that will give companies the edge to succeed in today's competitive environment.We work with large fortune 100 clients and are looking to add consultants to our team in the following technologies based on the career choice of the individual and also position with our clients. Job Description Our Training Features: · You will receive top quality instruction that is famous for Online IT training. · Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue. · Training sessions are conducted by real-time instructor with real-time examples. · Every training session is recorded and posted to the batch after each weekend class. · We are offering online training on Cyber Security. . Provide OPT Stem Ext.: Guidance and support for applying for the 24-month OPT STEM extension Help with OPT Employment letter: Help with drafting and obtaining OPT employment letters that meet USCIS requirements. · We provide training in technology of your choice. · Good online training virtual class room environment. · Highly qualified and experienced trainers. · Professional environment. · Special interview training · Training for skill enhancement. · Study material and Lab material provided. · E-Verified company. If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates. Thanks Additional Information No
    $69k-93k yearly est. 19h ago
  • Cyber Security Service Defensive Cyber Operations Analyst (Government)

    Att

    Cyber security analyst job in Bellevue, NE

    This position requires office presence of a minimum of 5 days per week and is only located at customer's site. No relocation is offered. AT&T Global Public Sector is a trusted provider of secure, IP enabled, cloud-based, network solutions and professional services to the Federal Government. We are dedicated to recruiting, developing and empowering a diverse, high-performing workforce that is passionate about what they do, committed to our shared values and dedicated to our customers' mission. AT&T is hiring to support a US Government Program that provides IT Services to US Strategic Command located in Omaha Nebraska. Job Duties/Responsibilities: Monitor Cybersecurity Service Provider (CSSP) sensors to detect and investigate abnormal findings. Perform threat intelligence analysis and generate timely, actionable reports. Triage cybersecurity incidents and provide support for incident response activities. Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems, networks, databases, and web-based assets. Assist in the development of mission-critical technical documentation. Analyze and assess business impacts resulting from theft, destruction, alteration, or denial of access to information. Conduct regular security audits to ensure secure operation of systems and adherence to defined security policies and procedures. Ensure compliance with security policies and plans for data, software, hardware, and telecommunications. Perform shift work to provide continuous 7x24 coverage and cybersecurity support. Required Clearance: TS/SCI (#clearable) (#tssci) Additional Clearance Requirements: Can start with a TS (#topsecret) Required Qualifications: 15+ years of experience in cybersecurity engineering, management, and strategy for USAF and other DoD IT programs. At least one of the following certifications: GCIA, GCLD, GDSA, GICSP, CISSP-ISSAP, or CISSP-ISSEP. Desired Qualifications: ITIL v4 certification. Extensive hands-on experience with CSSP operations, sensor monitoring, and incident response. Deep knowledge of DoD and USAF cybersecurity frameworks, policies, and procedures. Strong background in threat intelligence analysis and reporting. Experience developing technical and mission-critical documentation. Advanced analytical skills to assess business impacts of cyber incidents. Demonstrated ability to conduct comprehensive security audits. Experience supporting 24/7 operations in a shift-based environment. Excellent communication and collaboration skills for cross-functional team environments. Proven ability to adhere to, and help evolve, cybersecurity policies and security plans. Our Cyber Security Service Defensive Cyber Operations Analyst's earn between $78,800 - $91,500. Not to mention all the other amazing rewards that working at AT&T offers. Individual starting salary within this range may depend on geography, experience, expertise, and education/training. Joining our team comes with amazing perks and benefits: Medical/Dental/Vision coverage 401(k) plan Tuition reimbursement program Paid Time Off and Holidays (based on date of hire, at least 23 days of vacation each year and 9 company-designated holidays) Paid Parental Leave Paid Caregiver Leave Additional sick leave beyond what state and local law require may be available but is unprotected Adoption Reimbursement Disability Benefits (short term and long term) Life and Accidental Death Insurance Supplemental benefit programs: critical illness/accident hospital indemnity/group legal Employee Assistance Programs (EAP) Extensive employee wellness programs Employee discounts up to 50% off on eligible AT&T mobility plans and accessories, AT&T internet (and fiber where available) and AT&T phone Weekly Hours: 40 Time Type: Regular Location: Bellevue, Nebraska It is the policy of AT&T to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, AT&T will provide reasonable accommodations for qualified individuals with disabilities. AT&T is a fair chance employer and does not initiate a background check until an offer is made.
    $78.8k-91.5k yearly Auto-Apply 60d+ ago
  • Cyber Security Analyst Tier 3

    Freedom Technology Solutions Group

    Cyber security analyst job in Saint Louis, MO

    Freedom Technology Solutions Groups is looking to add a Tier 3 Cyber Security Analyst to the team. The candidate will provide CSOC Tier 3 services, which is 24x7x365 coordination, execution, and implementation of all actions required for the containment, eradication, and recovery measures for events and incidents. CSOC Tier 3 services includes malware and implant analysis, and forensic artifact handling and analysis. When a CIRT is stood up, all contractors in support of CSOC Tier 3 services will be under the direct control of, and take direction from, the Government CIRT Commander. While not in a period of incident response, the Contractor shall conduct continuous exercises and dry runs to improve response outcomes in the event of a cyber-incident. All Contractor personnel performing CSOC Tier 3 services shall have or obtain, within six months of start, a certification that is compliant with DoDD 8140.01 and DoD 8570.01-M IAT Level III and CSSP Incident Responder. Job Duties: Coordinate and implement tasks, performing analysis, and building/documenting response activities required during cyber security incident response, to include but not limited to actions such as implementing containment measures, IP blocks, domain blocks, and disabling user accounts on direction of the Government. Coordinates with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter intelligence personnel as required to perform advanced investigation and triage of incidents; Collaborates with appropriate authorities in the production of security incident reports; Categorizes incidents and events; Coordinates with other contracts, organizations, activities, and other services as appropriate to ensure incidents are properly reported, contained, and eradicated; Coordinates with other contracts, organizations, activities, and other services as appropriate to de-conflict blue / red team activity with open incidents/events; Coordinates with other contracts, organizations, activities, and services to ensure NGA recovers from an incident/event; Builds timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions. Documents actions taken and analysis in the authorized ticketing system to a level of detail where the actions taken and analysis are capable of being systematically reconstructed. Develops and when approved by the Government generates and updates reports in the Joint Incident Management System (JIMS), Incident Case Management System (ICMS), and/or other authorized reporting systems as directed; Develops, maintains, sustains, and when properly authorized by the Government executes custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events; Performs digital media analysis on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis; Develops and identifies indicators of compromise to send to Cybersecurity stakeholders and other Contract Services; Provides adversary attribution; Performs malware analysis and signature development; Coordinate with CSOC Tier 1 and 2 services to remediate all discrepancies and provide recommendations to prevent reoccurrence. Job Requirements: Bachelors Degree and or 6 years' experience in Cyber Security (CSOS) Active security clearance. DoDD 8140.01 and DoD 8570.01-M IAT Level II and CSSP Incident Responder. Provides input to and coordinates with all applicable stakeholders to develop and deliver the daily CSOC Significant Activity Report, the daily CSOC Operations Update, and the Weekly CSOC Status Report; Serve as C-IRT members as required and serve under the direct control of, and take direction from, the Government C-IRT Commander; Develop and coordinate courses of action with various Government and contract stakeholders, and when properly authorized by the Government, execute Defensive Cyberspace Operations-Internal Defensive Measures on behalf of the NGA on NGA networks and systems; Performs digital media analysis and malware reverse engineering on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis. When properly authorized by the Government, execute custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events; Develops, documents, and provides to the Government incident investigation reports which include sufficient information to document the entire lifecycle of the incident and the response, including but not limited to adversary and friendly forces activity, host and network analysis, timelines, and recommendations for corrective actions, recommendations for new Tactics, Techniques, and Procedures (TTP) and other recommendations as appropriate, within 30 days of C-IRT stand-down; Conduct Quality Control reviews of a percentage closed CSOC Tier 2 tickets each week to ensure proper analysis, categorization, documentation, and notification Preferred Qualifications: Masters degree IAT III Qualifications that are nice to have: Juniper certification What's in It for You? Flexible work environment A team mentality - work with friendly, like-minded professionals Work with innovative, cutting edge technologies Enjoy extremely competitive compensation and benefits A work-life balance you can count on Opportunities to grow and advance your career on our dime The Benefits You Get with Freedom Amazing benefits including matching 401k, fully paid medical, and more Generous paid time off - including paid site closure days Competitive salary offerings Paid training and tuition reimbursement Referral bonuses Fully paid life and disability Annual logo wear allowance Company sponsored events (game nights, holiday party, summer party, happy hours) Interested in learning more about Freedom and our culture? Contact us today! We're constantly hosting hiring events in our office and elsewhere, to help you get a sense of what life is like at Freedom before joining the team. As an Equal Opportunity Employer, we do not discriminate on the basis of race, color, religion, sex, age, marital status, disability or veteran status Applicant Federal & E-Verify Postings VEVRAA Federal Contractor Accessibility: If you need an accommodation as part of the employment process, please contact Human Resources at Phone: ************ Email: ********************* Equal Opportunity Employer, including disabled and veterans. If you want to view the EEO Law poster, please choose your language: English - Spanish - Arabic - Chinese If you want to view the EEO Law Supplement poster, please choose your language: English - Spanish - Chinese If you want to view the Pay Transparency Policy Statement, please click the link: English
    $66k-89k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Training

    Learnkwik.com

    Cyber security analyst job in Kansas City, MO

    Kanshe Infotech is Consulting Firm Which Provides World online training. Online Training (Remote Training + Real-time exp) available. Our training is more than just hours of lecture, we believe in student engagement, motivation and knowledge sharing as tools for success and we do it with great dedication and precision. We offer online training that clearly stands out of the group, sign up for a demo session. Job Description Our Training Features: · You will receive top quality instruction that Kanshe Infotech is famous for Online IT training. · Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue. · Training sessions are conducted by real-time instructor with real-time examples. · Every training session is recorded and posted to the batch after each weekend class. · We are offering online training on Cyber Security. . Provide OPT Stem Ext.: Guidance and support for applying for the 24-month OPT STEM extension Help with OPT Employment letter: Help with drafting and obtaining OPT employment letters that meet USCIS requirements. · We provide training in technology of your choice. · Good online training virtual class room environment. · Highly qualified and experienced trainers. · Professional environment. · Special interview training · Training for skill enhancement. · Study material and Lab material provided. · E-Verified company. If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates. Thanks Additional Information All your information will be kept confidential according to EEO guidelines.
    $65k-87k yearly est. 19h ago
  • Information Security Specialist

    Federal Reserve Bank of San Francisco 4.7company rating

    Cyber security analyst job in Kansas City, MO

    CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future. This role is responsible for modernizing the methods and procedures for performing cybersecurity risk management and assessing cybersecurity risk. This involves assessing the current approach, data, and tools to identify gaps and enhancements. It requires strong partnerships with key stakeholders and business leaders, conveying cyber risk to them in a way that allows them to make risk informed decisions and improve the Organization's security posture. Important Information Open to US Citizens, Green Card holders or Permanent Residents with at least 3 years of residency. No sponsorship is available. Candidates must have valid work authorization, without an end date to be considered. No H1-B, OPT, STEM OPT, CPT, TN, J-1, etc. This position requires working on-site with 5 days per month remote work flexibility. Key Activities Risk Assessment & Analysis Modernize the current approach to cybersecurity risk management and assessments. Research and evaluate methodologies and frameworks and subsequently apply them for use in the organization. Identify and implement risk quantification and scoring approaches within the organization. Perform in-depth data analysis to identify patterns, trends, and areas of focus and priority. Incorporate threat intelligence into risk assessments to provide context-aware risk evaluations. Conduct business impact analyses to understand how security incidents affect critical business functions. Evaluate and quantify risks associated with third-party vendors and supply chain. Assess specific risks related to cloud environments and services. Program Development Develop reports and dashboards to illustrate the organization's risk posture. Ensure that cybersecurity risk is integrated with IT risk, and informs overall Enterprise risk. Research and identify options to establish a risk register. Develop and track risk treatment plans including mitigation strategies, acceptance justifications, or transfer options. Map cybersecurity risks to relevant regulatory requirements and compliance frameworks. Continuously improve risk management processes based on industry trends and organizational needs. Communication & Collaboration Meet with technical experts and business leaders to convey cybersecurity risk in a way they can understand. Partner with incident response teams to incorporate lessons learned into risk models. Translate complex technical risk scenarios into actionable insights for all levels of the organization. Qualifications Experience Typically requires at least 6 years of relevant cybersecurity risk management experience. Experience with risk scoring methods and risk quantification. Experience with generating reports and dashboards to convey cybersecurity risk in a way that is easy to consume. Experience establishing or running an Enterprise cybersecurity risk management program. Experience with NIST SP 800-53 security standards. Experience presenting risk information to executive leadership. Education & Certifications Bachelor's degree specializing in an information technology field from an accredited college or university, or equivalent combination of directly related education and/or experience. Information Security industry certification (SSCP, CISSP, GIAC, CISM, CISA, etc.) preferred. Technical Knowledge Strong knowledge of and experience applying cybersecurity risk frameworks and assessment methodologies; examples may include Factor Analysis of Information Risk (FAIR), NIST Cybersecurity Framework (CSF). Strong skills and experience with data analysis. Experience with GRC (Governance, Risk, and Compliance) tools. Knowledge of business impact analysis methodologies. Familiarity with cloud security frameworks (CCSK, CCSP). Skills & Abilities Ability to understand technical details of cybersecurity risk. Ability to communicate complicated technical risk scenarios to all levels of the organization. Demonstrated self-motivation and ability to perform work independently, and also collaborate in a team environment. Additional Information How We Work (HWW): On-site: 5 days per month remote work flexibility Location: Kansas City, Denver, Oklahoma City, Omaha Remote Eligible: No Salary: $98,600 - $139,000 / Senior Level $117,300 - $165,400 / Advanced Level Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location. Screening: US Citizens or Green Card holders and Permanent Residents with at least 3 years of residency. This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and could take up to a couple of months to complete. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks. Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future. About Us Total Rewards & Benefits Who We Are What We Do Follow us on LinkedIn , Instagram, X (formerly Twitter) , and YouTube #KCFedIT Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America) The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences. Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels. Privacy Notice
    $117.3k-165.4k yearly Auto-Apply 32d ago
  • Sr. Cyber Security Analyst - Top Secret Clearance (SCI Eligible)

    JFL Consulting

    Cyber security analyst job in Bellevue, NE

    Full-time Description With more than twenty years of securing some of the U.S. Department of Defense and the Intelligence Community's most critical networks, JFL Consulting, LLC provides advanced network security solutions to a range of US Government and US commercial clients. Our cybersecurity operators are experts at assessing and defending mission-critical data and the networks that facilitate their operation. We are focused on delivering advanced products and industry best practices that meet each customer's unique requirements. Visit ********************* Job Description JFL Consulting, LLC is seeking a Senior Cyber Security Operator to support critical cybersecurity operations within highly secure environments. This role offers the opportunity to work on advanced network defense strategies, with a unique focus on passive vulnerability analysis: a specialized and low-impact method of identifying risks without active scanning. You'll play a key role in detecting anomalies, analyzing complex systems, and strengthening network security for high-value missions. This position is ideal for professionals who enjoy deep technical work, problem-solving, and contributing to meaningful national security efforts within a collaborative, mission-driven team. Job Title: Senior Cyber Security Operator Place of Performance: Bellevue, NE 68005 Mandatory Requirements: Top Secret Clearance (SCI Eligible) Experience Level: Senior-Level (8+ years in cybersecurity, 3+ years in passive vulnerability analysis) Responsibilities: Ensure the safe and proper functional operation of the toolkit and its components. Collect and document measures of performance per approved CONOPS. Analyze and document behaviors, characteristics, and attributes of a network's baseline activity within steady-state operations. Analyze and investigate potential anomalies or outliers from established baseline. Analyze and identify misconfigurations, faults, and vulnerabilities within the network's architecture, subcomponents, and utilized communication protocols. Determine root source of anomalies and extent of vulnerable findings for validation with system users and administrators. Document and report anomalies to appropriate channels for further investigation and notification. Document vulnerable findings and provide recommendations through appropriate channels that increase both security and operational capacity of the respective network. Recommend improvements to current operations for potential incorporation into the overall program. Collaborate with cross-functional teams to support incident response, system hardening, and policy development as needed. Additional duties as assigned 5-10% Conus Travel Requirements Education: Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or a related field preferred. Equivalent work experience may be considered in lieu of a degree. A master's degree is a plus. Certifications: Must hold an IAT Level II certification as defined and described in DoDD 8570.01, 8570.01-M, and 8140.01-03, and as amended. (e.g., Security+ CE, CySA+, CCNA Security, GSEC). Must hold a CSSP Analyst certification as defined and described in DoDD 8570.01, 8570.01-M, and 8140.01-03, and as amended. (e.g., CEH, CySA+, GCIA, GCIH). Preferred: Advanced certifications such as CISSP (Certified Information Systems Security Professional), OSCP (Offensive Security Certified Professional), or similar. Experience: Minimum 8 years in cybersecurity operations or analysis Minimum 3 years of experience with passive vulnerability detection techniques Experience supporting DoD or Intelligence Community networks Technical Skills: Practical experience with firewalls, network TAPs, IDS/IPS, endpoint protection, and other network defense technologies Adept in evaluating network protocols utilizing network analyzers, such as Wireshark, Tshark, and tcpdump Experienced in analyzing network datasets, including Zeek and firewall logs, to support threat hunting and security investigations. Experienced in leveraging data analysis platforms, such as Splunk, Kibana, and Arkime, to detect and analyze anomalous network activity Proficient in triaging Suricata alerts, tuning rules, and creating custom detections. Knowledge: In-depth understanding of network vulnerabilities and misconfigurations Strong knowledge of cybersecurity principles, adversary techniques, and detection/response strategies Experience working within the framework of a CONOPS or similar operational document Awareness of DoD cybersecurity frameworks (e.g., RMF, CMMC, NIST 800-53) and their application in secure system design and monitoring. Knowledge of common enterprise network architectures and defense mechanisms Experienced in analyzing TCP/IP, DNS, HTTP/S, SSL/TLS, SMB, and RDP protocols to identify vulnerabilities, misconfigurations, and indicators of malicious activity. Soft Skills: Strong analytical and investigative mindset Excellent documentation and reporting skills Effective communicator with ability to explain technical issues to both technical and non-technical audiences Comfortable working independently and as part of a cross-functional team Competitive Benefits Package Includes: 100% employer-paid medical, dental, and vision for employees and dependents 401(k) with 3% company contribution and immediate vesting Generous PTO policy (15 vacation, 5 sick, 2 personal days) Reimbursement for job-related certifications, generous training budget and company provided access to training platforms. JFL Consulting, LLC is an Equal Opportunity Employer. We do not discriminate against any applicant for employment on any legally recognized basis including, but not limited to: race, religion or creed, color, national origin, sex, age, disability, marital status, sexual orientation, genetic information, veteran status, status with regard to public assistance or any other protected class under federal, state or local statute. It is also the policy of JFL Consulting, LLC to provide reasonable accommodations for qualified individuals with disabilities.
    $70k-94k yearly est. 60d+ ago
  • Cyber Security Risk & Compliance Analyst

    Kansas State University 3.9company rating

    Cyber security analyst job in Manhattan, KS

    The Cyber Security Risk & Compliance Analyst is responsible for assessing and managing cybersecurity risks across the university's IT environment while ensuring adherence to regulatory requirements, industry standards, and institutional security p... * 520805 * Manhattan, Kansas, United States * Division of Info Tech * Staff Full Time (Unclassified - Regular) * Closing on: Jan 31 2026 * On-site Add to favorites View favorites About This Role The Cyber Security Risk & Compliance Analyst is responsible for assessing and managing cybersecurity risks across the university's IT environment while ensuring adherence to regulatory requirements, industry standards, and institutional security policies. This position plays a key role in identifying vulnerabilities, conducting risk assessments, monitoring compliance controls, and providing actionable recommendations to strengthen the university's overall security and compliance posture. About Us The role is with the Security Incident Operations Center (SIOC) team and works to optimize detection capabilities, improve response, and maintain proactive threat response protocols. The security operations engineer ensures that the university's IT assets remain resilient against evolving security threats while delivering high-quality service to stakeholders across the institution. Worksite Description This position is On-site. What You'll Need to Succeed Minimum Qualifications: * Requires a bachelor's degree and two years of relevant experience Preferred Qualifications: * 3-5 years of experience in compliance, audit, or risk management * Strong knowledge of regulatory frameworks and standards * Experience with GRC platforms * Understanding of risk assessment methodologies * Excellent written and verbal communication skills * Experience with audit processes and evidence collection * Knowledge of cybersecurity frameworks (NIST, ISO 27001) * Compliance or risk management certifications (CISA, CRISC, CISM) * Experience with specific industry regulations (FERPA, GLBA, PCI DSS, etc) * Knowledge of business process mapping and documentation * Experience with policy management systems * Understanding of legal and regulatory research Additional Role Information: * Occasional after-hours work for incident response or change management work in designated maintenance windows * Participation in on-call rotation (applicable positions) * Occasional travel required for training, conferences, or other events Sponsorship eligibility: Candidates must be legally authorized to work in the U.S. on an ongoing basis without sponsorship How to Apply Please submit the following documents: * Resume * Cover Letter * Three Professional References Application Window Applications close on: January 31, 2026 Anticipated Hiring Pay Range $61,591-$70,000 frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_2dca1e396ec8ae7afb704142b6b8ab6b" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/2dca1e396ec8ae7afb704142b6b8ab6b?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_1"> frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_c0d64716b16e90313d8327ce9bb0af04" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/c0d64716b16e90313d8327ce9bb0af04?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_3"> frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_7d751c6b5967126ac4d8c55b815f613b" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/7d751c6b5967126ac4d8c55b815f613b?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_5"> You may also be interested in Grant Specialist Other Agricultural Experiment Statn International Student and Scholar Coordinator Manhattan International Programs Research Associate Manhattan Carl Melinda Helwig Dpt BioAgE Why Join Us: Kansas State University offers a supportive and inclusive community, dedicated to your professional growth. While specific benefits may vary by position, many roles come with comprehensive packages that support your well-being and work-life balance, including health and life insurance, retirement plans, and generous paid time off. To learn more about benefits that are available for various positions, visit our benefits overview page. Work Authorization: Applicants must be currently authorized to work in the United States at the time of employment. Equal Employment Opportunity: Kansas State University is an Equal Opportunity Employer. All applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity, age, national origin, disability or status as a protected veteran. Remote and Hybrid work options: Some positions are eligible for remote or hybrid working arrangements. An employee who is working in a remote or hybrid capacity for K-State must reside within the United States in order to comply with all federal and state laws, filings, or tax requirements. Remote and hybrid work arrangements are not available for anyone who resides in the state of Idaho. Background Screening Statement: Upon acceptance of a contingent offer of employment, a candidate may be subject to a background check per K-State's background check policy. Interview Preferences: Kansas State University honors interview preferences for qualified applicants who are veterans or individuals with disabilities. Eligible applicants who meet the minimum qualifications, submit all required application materials, and submit required preference documentation by the closing date on the job advertisement will be granted a first-level interview. The disability and veteran interview preferences do not apply to student employment positions, temporary positions, athletics positions, academic and administrative department heads*, positions that require licensure as a physician, and positions that require that the employee be admitted to practice law in Kansas. * Heads of Departments refers to any individual holding a primary leadership role responsible for the overall strategic direction, management and operational oversight of a recognized academic or administrative unit within the university. To learn more about interview preferences at K-State, please visit our interview preferences page. frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_b63d88fbc8447ba82fcff7e6eacf09b0" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/b63d88fbc8447ba82fcff7e6eacf09b0?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=3_0">
    $61.6k-70k yearly 18d ago
  • Cyber Resilience Specialist

    Slalom 4.6company rating

    Cyber security analyst job in Saint Louis, MO

    Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. We are currently looking for a Senior Consultant or Principal level Security strategist with deep technical and functional expertise in Business Continuity and Disaster Recovery. What You'll Do * Lead and facilitate Business Impact Assessments (BIAs) across business units * Develop and update Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs) aligned to critical business functions and systems * Assess organizational risk and capability gaps related to crisis management, workforce continuity, and infrastructure resilience * Design tiered recovery strategies based on RTOs, RPOs, and MVC (Minimum Viable Company) principles * Coordinate and conduct tabletop exercises, test execution, and post-mortem reviews * Align BC/DR practices with enterprise risk management frameworks, compliance requirements (e.g., HIPAA, ISO 22301), and audit expectations * Support program governance, metrics, training, and awareness efforts What You'll Bring * 6+ years of experience in Business Continuity, Disaster Recovery, or operational resilience consulting * Strong working knowledge of BIAs, BCP/DRP development, and crisis management planning * Understanding of IT infrastructure concepts and DR technologies (e.g., backup systems, cloud platforms) * Experience supporting risk assessments and regulatory audits * Excellent facilitation and stakeholder management skills * Strong writing skills to produce clear, client-ready plans and reports About Us Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all. Compensation and Benefits Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance. Slalom is committed to fair and equitable compensation practices. For this role, we are hiring at the following levels and targeted base pay salary ranges: The targeted base salary pay range for Senior Consultant in New Jersey, New York City, and Washington DC is $153,000 to $186,000. The targeted base salary range for Senior Consultant in Atlanta, Chicago, Detroit, Kansas City, Minneapolis, Nashville, Philadelphia, Phoenix, St. Louis is $140,000 to $171,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time. We are committed to pay transparency and compliance with applicable laws. If you have questions or concerns about the pay range or other compensation information in this posting, please contact us at: ********************. EEO and Accommodations Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process. #LI-MS12
    $153k-186k yearly Easy Apply 60d+ ago
  • Senior Analyst, Security Compliance (SOX IT)

    Coinbase 4.2company rating

    Cyber security analyst job in Topeka, KS

    Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program. *What you'll be doing (ie. job duties):* * Lead Security and IT initiatives to support the SOX roadmap and advance program maturity * Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit * Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion * Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders * Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management * Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities * Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership * Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates * Work closely with internal and external auditors to educate them about a complex technology control environment * Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members * Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry * Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation *What we look for in you (ie. job requirements):* * Minimum of 5+ years of security/IT compliance or equivalent experience * Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance * Prior experience at a big 4 accounting firm * Experience leading compliance initiatives from start to finish * Proven understanding and audit experience of cloud technologies, AWS preferred * Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision * Strong oral and written communication skills * Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment * Ability to communicate with technical / non-technical stakeholders to align on shared outcomes * Experience in Financial services, Big Tech, or FinTech *Nice to haves:* * BA or BS in a technical field or equivalent experience * Security certifications e.g. CISA, CISSP, CISM or other relevant certifications * Experience auditing in Crypto space Position ID: P73675 \#LI-Remote *Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)). Pay Range: $167,280-$196,800 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations*********************************** *Global Data Privacy Notice for Job Candidates and Applicants* Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required. *AI Disclosure* For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. *The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
    $167.3k-196.8k yearly 59d ago
  • Network Security Analyst

    Sa Technologies Inc. 4.6company rating

    Cyber security analyst job in Wichita, KS

    SA Technologies Inc. (****************** is a market leader and one of the fastest growing IT consulting firms with operations in US, Canada, Mexico & India. SAT is an Oracle Gold Partner, SAP Services Partner & IBM Certified enterprise. We guarantee you the best rate for your skills and performance. Job Description Position: Network Security Analyst( Citizens and Authorised to work in the US only) Location: Wichita, KS (Locals preferred) Employment: Contract to hire/Full time Salary - DOE Job Functions Resolve trouble tickets and respond to alerts generated by monitoring systems Design and implement network and security solutions Participate in cross-discipline troubleshooting for high visibility or complex issues Manage legacy WAN environment, and participate in the design and implementation of new customer-facing applications hosted via the internet Create and maintain documentation including: network diagrams, incident reports, audit remediation and runbooks Job Requirements Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background. At least 5 years' experience in information services, with demonstrated knowledge in complex multi-site LAN/WAN environment. 2 or more years of experience with: Switching and Routing, Firewall Support and Troubleshooting, Wireless Networking, Intrusion prevention. Relevant certifications are beneficial including: CISSP, CCSA, CCSE, CCNA, and CCNP Location: Local to Wichita, KS is preferred. Work on-site in Wichita, KS with minimum travel requirements Must have excellent communication skills. ***NO REMOTE WORK*** Qualifications Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background. Additional Information Shibu ************
    $61k-81k yearly est. 20h ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Topeka, KS

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 29d ago
  • Engineer, Information Security

    Mariner Wealth Advisors 4.4company rating

    Cyber security analyst job in Overland Park, KS

    We're looking for a proactive and technically curious Information Security Engineer to join our Technology & Information Security team. In this role, you'll work within an engineering-minded security organization that values modern architectures, hands-on problem solving, and high-impact technical contributions. You'll help safeguard a complex, highly regulated environment while collaborating with teams who move quickly, think strategically, and execute with precision. If you thrive in dynamic environments, enjoy building and refining security capabilities, and want to make a meaningful impact on an organization's security posture-you'll feel right at home here. What You'll Do: Engineer and operate modern security platforms. Implement, run, and optimize enterprise-level security tooling across detection, identity, cloud, endpoint, and governance technologies. Conduct deep-dive security assessments. Evaluate systems, configurations, and architecture through hands-on testing and analysis-delivering actionable insights that directly influence engineering and business decisions. Strengthen core security operations. Support and mature processes such as: Malware response and remediation Vulnerability management and patch governance SIEM log analysis, correlation, and monitoring Incident documentation, reporting, and lifecycle management Improve systems by design-not by accident. Embed security into applications, infrastructure, and business initiatives from the outset, partnering with IT and engineering teams to identify risks and drive effective mitigations. Contribute through data, insights, and experimentation. Analyze trends, surface patterns, and help refine the firm's Information Security Program through continuous improvement and cross-functional engagement. What Makes This Role Unique: Technical leadership that “gets it.” You'll work under leaders with real engineering backgrounds who understand workflows, decision points, constraints, and trade-offs because they've been hands-on themselves. Security built on innovation, not stagnation. Our program prioritizes modern architectures, continuous improvement, and thoughtful evaluation of emerging standards, frameworks, and controls. Access to state-of-the-art platforms. Gain experience with advanced detection systems, automated response tooling, identity and access platforms, cloud-native security solutions, and governance technologies used across the industry. High-rigor environment with real impact. Build and refine capabilities in a financial-services context where precision, repeatability, and operational discipline matter-and influence enterprise-level direction. Collaboration with top industry partners. Participate in vendor assessments, tooling evaluations, and integrations that shape an enterprise-grade security program. Opportunities for broad domain depth. Contribute to initiatives spanning detection engineering, identity architecture, cloud security, automation, governance, and more. What You Bring: Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or equivalent experience. 3-5 years of hands-on experience in information security, IT operations, or adjacent engineering roles; experience in financial services is a plus. Familiarity with modern security tools, frameworks, and standards (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001). Familiarity with identity and access management (IAM) solutions, such as Okta, including integration with applications and security systems. Experience with automation, including scripting languages (e.g., Python, PowerShell, Bash) to streamline security processes, workflows, and response actions. Ability to operate with autonomy, accountability, and comfort in fast-moving environments. Exceptional communication and collaboration skills with the ability to influence across teams. Analytical mindset with a high bar for detail, documentation, and operational excellence. Why Join Us We foster a culture that values curiosity, innovation, and ownership. You'll have opportunities to grow, to experiment, and to contribute directly to the firm's security maturity. Our team operates in a flexible, hybrid environment designed to support both high performance and work-life balance. We're dedicated to building a diverse, inclusive culture where people can do the best work of their careers-and see the real impact of what they're building. Our compensation reflects the cost of talent across multiple US geographic markets. The base pay for this position across all US geographic markets ranges from $99,000.00/year to $125,000.00/year. Pay is based on a number of factors including geographic location and may vary depending on job-related knowledge, skills, and experience. Eligibility to participate in an incentive program is subject to the rules governing the program, whereby an award, if any, depends on various factors including, without limitation, individual and organizational performance. Roles may also be eligible for additional compensation and/or benefits. #LI-JS1 #LI-REMOTE EOE/M-F/D/V
    $99k-125k yearly Auto-Apply 43d ago
  • Information Security Specialist

    Collabera 4.5company rating

    Cyber security analyst job in Saint Louis, MO

    Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers. Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations. For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US. Job Description Responsibilities: Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios. Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization Qualifications Required Skills/Experience • 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role • Knowledge of quantitative and qualitative risk evaluation methods • An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one • An ability to effectively influence others to modify their opinions, plans, or behaviors • An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business • Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part • An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization • Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement Additional Information To set up an inerview for this position, feel free to contact: Imran Malek ************ *******************************
    $71k-97k yearly est. Easy Apply 19h ago
  • Cyber Security Engineer

    CSA Global LLC 4.3company rating

    Cyber security analyst job in Beverly, KS

    Job DescriptionDescription: Client Solution Architects (CSA) is currently seeking a Cyber Security Engineer to support our program at Fort Leavenworth, KS. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions. How Role will make an impact: Maintains the appropriate operational security posture and documentation for MCTSP information systems Implementing DoD, Army, ARNG, and MCTSP information security policies Creating and implementing POA&M in response to vulnerabilities identified during risk assessments, audits, and inspections RMF document and artifact management Managing and tracking the IAVM system Physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and assistance in the development of security policies and procedures. Requirements: What you'll need to have to join our award-winning team: Clearance: Must possess and maintain an active Secret Clearance. Bachelor's degree in Cyber Security or related field or associate degree and 5 years of specialized experience. IAT II Certification 3 years' experience in assessing and mitigating risk for networks and systems utilized in LVC and integrated training environments that include simulations that stimulate Army C2 Systems. 3 years' experience planning architectures for LVC and integrated training environments and for stimulation of Army Mission Command Systems in support of Division and Above training events and distributed exercises; 5 years' experience with military training and training support; experience designing and supporting distributed, simulation-supported exercises Why You'll Love this Job: Purpose filled roles that contribute to impactful solutions to advance our federal clients' mission. You may examine doctrine, plans, policies and procedures that will enhance and enrich the training environment, ensuring our warfighters are fully prepared for any challenge. Daily opportunities to develop new skills Team environment What We Can Offer You: Compensation Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division. Diversity, Inclusion & Belonging We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. Benefits Healthcare (medical, dental, vision, prescription drugs) Pet Insurance 401(k) savings plan Paid Time Off (PTO) Holiday pay opportunities Basic life insurance AD&D insurance Company-paid Short-Term and Long-Term Disability Employee Assistance Program Tuition Support Options Identity Theft Program
    $77k-105k yearly est. 4d ago
  • Data Security Analyst

    The Timberline Group

    Cyber security analyst job in Saint Louis, MO

    Join our dynamic and thriving company as a Data Security Analyst in St. Louis, MO where you'll have the opportunity to make an impact and shape the future of our renowned brands. If you have a passion for fashion, eager to learn and have an eye for detail, this is the perfect role for you! As a member of our team, you'll be part of a company that values results, caring and learning. What You'll Be Doing Monitor security service performance and availability: Provide recommendations on security equipment, software, and services On-going investigation: Inspect information security alarms and events to determine vulnerability and impact Implement processes: Put forth structured risk assessment processes, conducting ongoing threat and vulnerability assessments, and evaluating controls and countermeasures to mitigate risk Participate in architecture reviews: Ensure adherence to information security architecture Develop processes: Create plans for preventing, detecting, identifying, analyzing and responding to information security incidents Design and deliver programs: Create education and training programs on information security and privacy matters The Timberline Group Phone: ************ PO Box 565, Sullivan, Mo 63080 ********************* ************************* "Delivering quality solutions through quality people"
    $64k-89k yearly est. Easy Apply 60d+ ago
  • Information Security Operations Analyst II

    Mastercard 4.7company rating

    Cyber security analyst job in OFallon, MO

    Our Purpose Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential. Title and Summary Information Security Operations Analyst IIOverview The Security Awareness team is looking for an Information Security Operations Analyst II to drive continued improvements to the education and training offerings we have for our Mastercard colleagues. Our award winning SecurIT First program must continue to remain relevant and effective in how we keep security awareness top of mind for all employees and contingent staff. The ideal candidate is passionate about the internal customer experience, is highly motivated, intellectually curious, analytical, and possesses an entrepreneurial mindset. Role In this Security Awareness position, you will: • Liaise between the Security Awareness team and all others at Mastercard. • Build new content and design awareness events to positively impact the security behaviors of Mastercard staff. • Partner with external providers to deliver effectives solutions with quality and integrity. • Manage our collaboration with the M&A Team and manage all Audit and Regulatory requests that come into our team. All About You The ideal candidate for this position should: • Possess advanced knowledge in security awareness concepts and principals. • Be comfortable meeting with business leaders to discuss and educate their teams about the desired security behaviors and how to influence and improve those behaviors. • Be able to identify appropriate security awareness solutions to further reduce the human risk at Mastercard. • Analyze, recognize and escalate trends in security behaviors and identify ways to improve our offerings. • Lead vendor relationships with those providers of contract solutions for the Security Awareness program. • A professional certification in Security Awareness is not required but highly encouraged. Corporate Security Responsibility Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must: Abide by Mastercard's security policies and practices; • Ensure the confidentiality and integrity of the information being accessed. • Report any suspected information security violation or breach. • Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected information security violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Mastercard benefits for interns generally include: 56 hours of Paid Sick and Safe Time; jury duty leave; and on-site fitness facilities in some locations. Pay Ranges O'Fallon, Missouri: $76,000 - $127,000 USD
    $76k-127k yearly Auto-Apply 16d ago
  • Security Engineer II

    Trustmark 4.6company rating

    Cyber security analyst job in Topeka, KS

    Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities. We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information. You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs. **Responsibilities:** + Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data. + Conduct vulnerability assessments and penetration testing to identify and mitigate risks. + Develop and implement security policies, standards, and procedures. + Monitor security systems and respond to incidents promptly and effectively. + Stay up-to-date with the latest cybersecurity threats and trends. + Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business. + Provide technical guidance and support to internal stakeholders. **Qualifications:** + Bachelor's degree in Computer Science, Information Technology, or a related field or + 3-5 Years of network engineering or cyber engineering experience + Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001). + Proficiency in network security, systems security, application security, and data security. + Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM). + Excellent problem-solving and analytical skills. + Strong communication and interpersonal skills. + Ability to work independently and as part of a team. **Preferred Qualifications:** + Certifications such as CISSP, CISA, or CEH. + Experience with cloud security (e.g., AWS, Azure, GCP). + Knowledge of scripting and programming languages (e.g., Python, PowerShell). Brand: Trustmark Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums. **For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability. Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match. When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives. At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
    $76k-98k yearly est. 60d+ ago
  • Security Systems Engineer II

    Paladin Technologies

    Cyber security analyst job in Omaha, NE

    Job Description POSITION OVERVIEW: This position is responsible for integrated security system design and review of system functionality to determine proper operation of access control, IP video and other security systems and controls. GENERAL ACCOUNTABILITIES: Represent Company in a business-like professional manner in both conduct and appearance, to maximize client satisfaction. Available to work outside of, or in addition to, normal businesses hours. Work in compliance with the Company's polices and procedures including safety manual with safety of self and others in mind at all times. Maintain and protect assigned Company assets. Accurate written record keeping, submitted on time and complete. SPECIFIC ACCOUNTABILITIES: Include, but not limited to: Prepare drawings and wiring diagrams, based upon project plans and specifications, showing locations of devices, equipment, and wiring etc. for low voltage electrical projects. Develops functional design, construction drawings, relay settings, and equipment specifications for protection, control, and communications equipment. Preparing electrical construction documents for both building renovations and new construction projects. Designing and applying low voltage systems, including security networks, IP Video, mass notification, and security systems. Responsible for all aspects of low voltage design within designated projects. Conducts surveys to gather field data; prepares drawings, layouts, and other visual aids; prepares technical construction drawings. Reviews the development of designs for compliance with applicable codes, adopted engineering standards, and good engineering practices. Deliver technical presentations to internal and external audiences as required as part of the design process. Work in a close team environment with Sales, Project Management, and Installation Departments Work with CAD Drafters to produce installation and drawing packages. Engineering sales support and review of the functionality and design of systems being proposed by account managers. Set-up and test new products and design concepts such as network devices, custom designed systems, etc. Coaching and Mentoring of System Designers and Systems Engineers as requested. REQUIRED QUALIFICATIONS: High School diploma or equivalent Technical 2 year degree or better and/or 3-5 years of security industry design experience Experience engineering low voltage systems, preferably experience with AV, DAS and/or Structured Cabling as well. Certification in 2 Access Control platforms or equivalent documented experience Certification in 2 Video Management platforms or equivalent documented experience Certification in 1 Intrusion platform or equivalent documented experience Knowledge of NEC Code and low voltage systems Proficiency with Microsoft Office and computerized business systems Valid US drivers license Ability to pass pre-employment screening PREFERRED QUALIFICATIONS: Certification in Networking and/or SQL. General knowledge of network security principals including data routing, switching, wireless radios, multicasting, VPNs, Enterprise VMS, AV, DAS and/or Structured Cabling, and Enterprise level Access Control Systems. PROFESSIONAL COMPETENCIES: Ability to function as an effective team leader, and inspire, motivate, coach and mentor others. Well-organized, responsible, and good communication skills . Ability to solve practical problems and carry out responsibilities with minimal supervision. Ability to finish projects on time. Ability to organize workload for effective implementation. Ability to clearly and concisely present information in one-on-one and small group situations. Strong customer focus with a proven record of results. Ability to interact effectively at all levels and across diverse cultures. Ability to adapt as the external environment and organization evolves . PHYSICAL DEMANDS: In general, the following physical demands are representative of those that must be met by an employee to successfully perform the essential functions of this job. Must be able to effectively communicate, (i.e. see, hear, speak and write clearly) in order to communicate with employees and/or other customers; manual dexterity required for occasional reaching and lifting of small objects, and operating office equipment. WORKING CONDITIONS: In general, the following conditions of the work environment are representative of those that an employee encounters while performing the essential functions of this job. Must be able to work outside normal business hours, as business dictates. Limited travel required. Pay: $80,000 - $105,000 (DOE) Company Info: Paladin Technologies is a premier North American complex systems integrator for building technology solutions, including IP security, alarms & monitoring, audio visual, low-voltage infrastructure, and networking. As a leader in the design, deployment, optimization, management, and maintenance of communication and digital networks, Paladin can meet the needs of clients on a national scale, while providing local support. Our team is the best in the industry, with manufacturer trained technicians, PMP-certified project managers, CTS- and RCDD-certified design engineers, coordinators, and administrative resources. Paladin has offices coast to coast across the United States and Canada, and nearly 1,700 talented and committed professionals dedicated to custom-crafting and installing technology solutions for clients requiring Integrated Security, Network Infrastructure, Audio Visual, Fiber Optics/OSP, Structured Cabling, and more. We are always at the forefront of the changing technology landscape, and through continued training, complex client projects, and company support, we provide our colleagues with exciting challenges and a rewarding career as Paladin continues to grow. This company considers candidates regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Equal Opportunity Employer, including disability & veterans, or any other characteristic protected by law. If you need accommodation for any part of the application process, please send an email or call ************** to speak with Human Resources and let us know the nature of your request. We thank you for your application, however only those selected for an interview will be contacted. Powered by JazzHR INxA1P6lub
    $80k-105k yearly 13d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Topeka, KS?

The average cyber security analyst in Topeka, KS earns between $57,000 and $101,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Topeka, KS

$76,000
Job type you want
Full Time
Part Time
Internship
Temporary