Cyber security analyst jobs in Tuscaloosa, AL - 170 jobs
All
Cyber Security Analyst
Senior Security Analyst
Cyber Security Engineer
Securities Analyst
Data Security Analyst
Information Systems Security Officer
Cyber Security Specialist
Security Engineer
Intrusion Detection Analyst
Defense Analyst
Information Assurance Analyst
Information Security Engineer
Cyber Security Analyst
Bellatrix HRM
Cyber security analyst job in Huntsville, AL
Bellatrix-Latin for "Female Warrior" Owned and operated in a HUBZone, with over 25 years in the HR, Talent Acquisition and Government Contracting. Like the Bellatrix Star in the Orion Constellation, our Team Members are the Brilliance of the company, and are all shareholders, leading the company to success. Bellatrix prides itself on being a Small Woman Owned HUBZone company. We believe big does not equal best. By staying small, we can focus on agility, efficiency, and our people. At Bellatrix we believe in advancement from within through training, mentorship, innovation and truly being a family. Bellatrix believes in excellence in customer service, and catering to the customer's needs. We realize not everyone fits into a box, and we think outside of the box to ensure, affordable and outstanding services. Human Resources, Retention and Recruiting, and Medical Coding/Billing are the HRM of Bellatrix. Come and join our team, where you are a team member and shareholder, working together for growth.
Bellatrix has the current position open as a direct W2, Fulltime position for one of our top clients in the Huntsville, AL Market. This position requires a Secret Clearance and is on location with the Missile Defense Agency
Title: CyberSecurityAnalyst
Location: Onsite-Huntsville, AL
Program: MDA, C3BM and C2BMC
Number of Openings: 2
Immediate Direct Hire
Clearance: Secret
Travel: 25%
Salary Range: $150,000-165,000, DOE
General Overview:
Command, Control, Communications, and Battle Management (C3BM) cyber engineering efforts include engaging in Command, Control, Battle Management, and Communications (C2BMC) technical engineering and integration, future concepts, new functionality, and multi-national exchange designs. Cyber engineering tasking includes participation in reviews and assessments of C2BMC cybersecurity and documentation. Collaboration with MDS stakeholders is required to prepare C2BMC cyber products as part of the engineering objectives documentation and analysis processes as related to Defense Of Guam (DoG).Other activities include participation in engineering meetings, presenting engineering product development updates, providing analysis and failure review summaries.
Responsibilities:
Understand cybersecurity aspects of systems engineering development, as well as DoD cybersecurity requirements, and be capable of recommending changes to the Government about the contractor's system engineering development process.
Perform cybersecurity risk assessment reviews to include changes, modifications, and/or updates of software and/or hardware to individual information systems and/or enterprise environment.
Familiarity with Configuration Management to include oversight and engineering assessments of Cybersecurity fixes, patch development, and pre-release testing in support of DoG.
Performing cybersecurity risk assessment describing the posture of an individual information systems through an enterprise architecture in support of DoG.
Will directly support the Software Assurance program for C2BMC. Includes ability for assessments of code reviews and approvals/disapprovals of software products for use on Mission, Training and Test/Development C2BMC systems is support of DoG
Requirements:
Bachelor's degree in STEM program: Computer Science, Information Technology, Network Engineering or other similar program
5+ years of Related Experience
Secret Clearance
Familiarity with MDS cyber capabilities and policy
Familiarity with Missile Defense Agency, Ballistic Missile Defense System, and/or C3BM Program Office work efforts
Security +, CE with a preferred certification level of CISSP
Ability to work independently within a dynamic environment
Apply cyber engineering and solutions to support real-world test, integration, and operations
Work within a collaborative environment composed of Government, prime contractor, sub-contractor and supporting contractor personnel in a badge-less contractor environment
Bellatrix is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
$150k-165k yearly 60d+ ago
Looking for a job?
Let Zippia find it for you.
Journeyman Cyber Analyst
Ironmountain Solutions 4.2
Cyber security analyst job in Huntsville, AL
501588 Journeyman CyberAnalyst
Schedule: Full Time; 40 hours per week remote work not authorized
IronMountain Solutions is seeing a Journeyman CyberAnalyst to provide support for a Redstone Arsenal customer. Candidates should be highly motivated, a self-starter, and able to handle multiple tasks simultaneously. Candidates must have the ability to obtain and maintain a Secret-level security clearance.
Job Duties:
• Process / maintain records in Enterprise Misson Assurance Support Service (eMASS) in both NIPR & SIPR environments.
• Process / maintain records in Army Portfolio Management System (APMS)
• Run Assured Compliance Assessment Solution (ACAS) scans and maintains standalone ACAS server.
• Assist in the development, review, and maintenance of documentation for assigned information systems. System Security Plan, Software Fielding Plan, Continuous monitoring strategy,
• Security Control Implementation: Support the implementation and validation of security controls (technical, administrative, and physical) as outlined in the SSP.
• Vulnerability Management: Assist in vulnerability scanning and risk assessments, tracking remediation efforts, and reporting findings.
• Security Incident Response: Participate in incident response activities, including initial triage, documentation, and reporting.
• Configuration Management: Assist in maintaining accurate system configurations and documenting changes.
• Authorization Support: Assist in preparing systems for Authorization to Operate (ATO) and maintaining system authorizations.
• Compliance Monitoring: Assist in monitoring systems for compliance with security policies and procedures.
• Participate in Cyber and System Engineering working group meetings with other organizations and OEMs under contract with ATE PM.
• While performing the duties of this job, the employee is occasionally required to stand; walk; sit; use tools or controls; normal physical activity (reach with hands and arms; climb stairs); and communicate effectively with all levels of employees and leadership. The employee must occasionally lift or move office products and supplies, up to 25 pounds.
Basic Qualifications:
• 3 - 10 years of relevant experience
• BS or MS Degree required
• CompTIA Security+ certification is preferred.
• Other relevant certifications (e.g., Certified Ethical Hacker (CEH), A+, entry level) are a plus
• Familiarity with embedded RTOS
• Familiarity with protocols such as ARINC-429 & MIL-STD-1553 are a plus
• Develop strong working relationships with ATE personnel and management
• Ability to manage complex projects and work effectively with others
• Ability to research, report and troubleshoot cybersecurity related issues
• Have a Secret clearance. Per federal Per federal requirements, only U.S. citizens are eligible for this level of clearance.
IronMountain Solutions is an Equal Opportunity Employer
$67k-92k yearly est. Auto-Apply 12d ago
Cyber Threat Emulation Analyst
Launchtech
Cyber security analyst job in Huntsville, AL
Job Description
or
Huntsville, AL - Redstone Arsenal (On-site) Clearance Required: Active Secret Clearance (or higher) Travel Required: Up to 10%
LaunchTech is seeking a Mid-Level Cyber Threat Emulation Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly to improving the agency's defensive posture while mentoring analysts and executing cyber threat emulation engagements aligned with real-world adversary tactics.
What You'll Do
As a Mid-Level Cyber Threat Emulation Analyst, you will:
Perform Defensive Cyber Operations (DCO) and CyberSecurity Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM)
Perform cybersecurity duties on customer networks to improve enterprise-wide security posture
Analyze correlated asset, threat, and vulnerability data against known adversary exploits and techniques to determine operational impacts and strengthen defensive posture
Support the development, review, and updates of DCO procedures, processes, manuals, and other documentation
Measure defense-in-depth effectiveness against known vulnerabilities
Generate vulnerability assessment reports and escalate findings for review
Support enterprise Incident Response in accordance with DoD regulations and instructions
Lead cyber events and incident investigations from start to conclusion, including data gathering, analysis, and reporting
Instruct, evaluate, and mentor analysts at junior, mid, and senior levels; support development of exploitation analyst training plans
Receive, review, and implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders weekly
Perform Cyber Threat Emulation (CTE) actions using Automated Security Validation toolsets per HHQ direction
Execute CTE actions within approved network zones using specific adversary tactics, techniques, and procedures (TTPs)
Create dashboards and reports communicating post-engagement analysis, vulnerabilities, recommended remediations, system security posture assessments, and incident response results
Draft and submit Cyber Tasking Orders (CTOs) to address findings discovered during CTE engagements
Collaborate with the Cyberspace Domain Awareness (CDA) team to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices
What You Bring
Basic Requirements:
Must have 6, or more, years of general (full-time) work experience
Must have 4 years of combined experience with:
Performing manual or automated penetration tests in an enterprise environment
Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments
Experience performing the full life cycle of incident response and enterprise-level monitoring
Must have 1 year of experience in management or leadership in a team environment
Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) (CySA+, GICSP, GSEC, Security+ CE, SSCP)
Must have, or obtain within 6 months of start date, a PenTest+ certification
Must have an active DoD Secret Security Clearance
Desired Requirements:
Have a Bachelor's degree, or higher, in Cybersecurity, Computer Science, or related field
Have experience with Cyber Threat Emulation tools, policies, and procedures
Have experience operating custom software on a Linux platform
Have experience with security analysis and solutions in WAN/LAN environments (Routers, Switches, Network Devices, Windows, Linux)
Have experience with SOC/DCO tools including Firewalls, Intrusion Detection/Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc.
Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred)
Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred)
Be able to mentor and train personnel in a high-paced environment
Be familiar with DoD Security Operations Centers (SOC/CSSP)
Be familiar with DCO/CSSP-guiding security policies and procedures
Have an active DoD Top Secret clearance
Why LaunchTech?
At LaunchTech, we don't just fill seats, we bring in people who want to make an impact. We deliver Excellence, Period. You will join a mission-driven team where your expertise directly strengthens national defense and advances cybersecurity excellence.
We offer competitive benefits, including:
Medical, Dental, and Vision coverage
401(k) with company match
Paid Time Off (PTO)
Opportunities to make a meaningful impact while advancing your career
And more
Ready to Join the LaunchTech Crew?
If you're ready to apply your cyber expertise to mission-critical defense operations, we want to hear from you.
LaunchTech is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind. All qualified applicants will receive consideration for employment without regard to race, protected veteran status, color, sex, religion, sexual orientation, national origin, disability, genetic information, age, pregnancy, or any other status protected under federal, state, or local law.
Powered by JazzHR
CkYm1Mbb4K
$64k-87k yearly est. 2d ago
Mid-Level Cyber/Watch Floor Analyst
Noetic Strategies Inc.
Cyber security analyst job in Huntsville, AL
Job DescriptionJob Title: Mid-Level Cybersecurity/Watch floor Analyst Clearance: MUST CURRENTLY POSSESS AND ACTIVE TOP SECRET CLEARANCE Noetic is currently seeking a motivated and detail-oriented Mid-Level Cybersecurity/Watch Floor Analyst to join our growing security team. In this junior-level role, you will play a key part in protecting our organization's digital assets by assisting in the detection, analysis, and response to cybersecurity threats and incidents. The ideal candidate will have foundational knowledge of security principles and a strong interest in security operations, with hands-on experience or coursework involving Splunk.
BASIC QUALIFICATIONS:
Minimum of 5 year of Splunk/SOC experience.
Bachelor's in a computer science related field
Active Top Secret Clearance
Ability and willingness to do shift work
MAIN RESPONSIBILITIES:
Responsible for monitoring computer networks for security issues.
Investigating security breaches and other cybersecurity incidents.
Document security breaches and assess the damage they cause.
Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing.
Fix detected vulnerabilities to maintain a high-security standard.
Recommend best practices for IT security.
Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs.
Must be capable of conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files.
Decrypts data and provides technical summaries and input.
Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis.
Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).
PREFERRED QUALIFICATIONS
Microsoft Sentinel
GIAC Continuous Monitoring Certification (GMON)
GIAC Certified Incident Handler (GCIH)
GIAC Certified Forensic Analyst (GCFA)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Network Forensic Analyst (GNFA)
Noetic Strategies Inc. offers a competitive salary, an extensive benefits package and a work environment that encourages excellence. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
Noetic Strategies Inc. is an equal opportunity and affirmative action employer that does not discriminate in employment.
All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, or national origin, disability or protected veteran status.
Noetic Strategies Inc. endeavors to make ************************ accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact noeticstrategies.com for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
Powered by JazzHR
6IxgcPuXI3
$64k-87k yearly est. 16d ago
Cyber Security Analyst
Pmu Recruitment
Cyber security analyst job in Alabama
CyberSecurityAnalyst - (2400000X) Description AL-KHOBAR, KINGDOM OF SAUDI ARABIA CyberSecurityAnalyst Department Information Technology Institution Prince Mohammad bin Fahd University Reports to Manager - CyberSecurity introduction The CyberSecurityAnalyst at Prince Mohammad bin Fahd University protects the university's digital assets, network, and data by identifying vulnerabilities, monitoring threats, and enforcing security measures. This role ensures compliance with security policies, supporting a safe environment for research and academic activities.
Job Purpose
The CyberSecurityAnalyst role is to safeguard the university's IT infrastructure by proactively monitoring, identifying, and addressing security threats. This position involves implementing security measures, responding to incidents, and ensuring compliance with security policies to protect data and maintain the integrity of university systems. The analyst plays a key role in supporting a secure environment for all digital and academic activities.
Duties and Responsibilities
Major Duties/ Responsibilities:
· Monitor all networks and computer systems to prevent, detect, and investigate security breaches.
· Perform penetration testing to ensure the company's networks are free of bugs that malware authors can take advantage of.
· Design and implement multilevel security strategies to protect networks and data resources.
· Plan computer and network security upgrades and test hardware and software related to the upgrade.
· Stay up to date on new information technologies and apply those innovations in the company's security standards and best practices.
· Lead analysis of current architecture, risk exposure and defining mitigation measures in order to develop suitable recommendations.
· Highlight CyberSecurity threats and prepare the official reports.
· Lead assessments of company's security posture including benchmarking/maturity assessments.
· Lead design of cybersecurity solutions and development of detailed technical specifications for the approved designs.
· Lead implementation, integration and testing of approved security solutions.
· Provide specialist technical support and address technical problems related to applications and production equipment to ensure any complex/escalated issues are handled with no or minimal downtime.
· Oversee/perform preventive maintenance as per schedule to ensure relevant security systems/processes remain fit for purpose.
· Provide subject matter expertise for cybersecurity related projects throughout its lifecycle to ensure delivery is as per plan/budget and client/TCC expectations.
· Prepare and deliver technical presentations for successful project delivery
· Lead cybersecurity evaluation and configuration review services
· Anticipate future problem areas by monitoring workflows and network traffic patterns.
· Prepare and perform cybersecurity awareness activities.
· Prepare work papers documenting procedures performed and that fully support audit findings.
· Assist IT operational audits in accordance with the annual audit plan.
· Follows up the action plan progress (such as penetration tests, vulnerability scans) and ensures that recommendations are implemented in a timely manner
· Assist staff members when they need help with security products and processes.
Job-Specific Skills:
· Working experience in a SOC or NOSC environment
· Must have strong working knowledge of information technology, including applications, networks and systems.
· Knowledge in performing IT Audit reports
· Experience in performing Risk Assessments reports.
· Experience in developing Business Continuity Plans and Disaster Recovery Plans
· Knowledge in the usage of vulnerability assessment and penetration testing tools
· Knowledge of security attacks techniques, familiar with MITRE ATT@CK framework
· Experience in using MS Office, MS Visio, Project Management tool.
· Experience in project management, problem-solving, training/coaching, presentation skills, and conflict resolution skills.
· General knowledge of ISO 27001, ITIL or other control frameworks
· Experience in writing SOP's - operation manuals
· Independent, motivated, and ambitious personality
Qualifications & Experience (Required)
Bachelor's degree in computer science, technology or computer engineering
5 to 8 years of experience in progressively more complex and responsible operational roles within a dynamic Enterprise function
Certified CompTIA Security+, CEH, CCNA, CCNP, CISSP (preferred)
Experience in Cisco ASA, WatchGuard, Juniper, CheckPoint Firewall
Knowledge of network and web protocols, and an in-depth knowledge of Linux/Unix tools and architecture
Experience in Patch Management and vulnerably assessment.
Knowledge and understanding of relevant legal and regulatory requirements.
Knowledge of common information security management frameworks.
Experience in Information Security and NCA controls implementation.
Having experience in IT, Operational IT, Cybersecurity, incident detection, incident response, and forensics.
Maintain quality service delivery by adhering to company standards and best practices.
Strong attention to detail with an analytical mind and outstanding problem-solving skills.
Familiarity with information technology concepts such as infrastructure, cybersecurity, and application controls.
Great awareness of cybersecurity trends and hacking techniques.
On-call network troubleshooting
Knowledge, Skills and Abilities (Required)
· Strong written and verbal communication skills
· Strong focus on first time quality
· Desire to grow technical skills and ability to learn new technologies swiftly
· High attention to detail, self-starter, result driven
· Ability to work in a cross-functional team
· Professional, polite, and attentive while also being accurate
· Always prepared and responsive, willing to meet each challenge directly
· Teamwork
· Problem solving, Leadership
· Perseverance and motivation
· Ability to work under pressure, Confidence
· Managing ambiguity, Resilience
· Analytical skills, IT skills
Disclaimer
PMU reserves the right to alter, amend and add responsibilities to this position in line with the institutional needs. Changes and amendments to this job description shall be within the academic framework and the general employment conditions. Primary Location: Al-KHOBARJob: AnalystOrganization: Information Technology DepartmentSchedule: Regular StandardJob Type: Full-time Job Posting: Feb 25, 2025, 9:10:34 AM
$64k-87k yearly est. Auto-Apply 60d+ ago
Cyber Security Analyst
Deploy 3.9
Cyber security analyst job in Birmingham, AL
Job Title: Senior CybersecurityAnalyst
Ready to be the digital bodyguard of a fast-moving financial organization?
We're on the hunt for a Senior CybersecurityAnalyst who eats threats for breakfast and sleeps soundly knowing our systems are locked down tighter than Fort Knox. If you live for red alerts, thrive in the middle of incident response chaos, and can quote GLBA like it's your favorite movie, keep reading.
You'll be our frontline of defense, leading investigations, outsmarting hackers, and keeping customer data safe and secure. Oh, and did we mention you'll be the go-to brain for junior analysts and a security Jedi across the organization?
What You'll Be Doing:
Watchdog Mode: Monitor and analyze alerts from SIEM, EDR, and intel feeds to identify threats before they make headlines.
Incident Commander: Take the lead when things go sidewayscoordinate response, trace the threat, and lock it down.
Vulnerability Sleuth: Sniff out weaknesses and help teams patch them before the bad guys can get in.
Regulation Rock Star: Stay in the know on compliance standards like GLBA, PCI, SOX, and FFIECand help us stay ahead of the curve.
Risk Whisperer: Work with audit, compliance, and risk teams to identify gaps and close them with smart, scalable solutions.
Third-Party Sheriff: Help assess vendors and partners to make sure their security posture doesnt put us at risk.
Drill Sergeant: Run pen tests, tabletop exercises, and what-if scenarios so were always battle-ready.
Documentation Guru: Keep incident playbooks sharp, audits smooth, and risk assessments tight.
Mentor-in-Chief: Share your know-how, guide junior team members, and raise the bar across Security Ops.
️ What You Bring:
A degree in Cybersecurity, InfoSec, CS, or street-smart equivalent experience.
5+ years in the cybersecurity trenches, ideally within fintech, banking, or financial services.
Mastery of regulatory frameworks (GLBA, PCI, SOX, FFIECyou know the drill).
Command over SIEMs, EDR, firewalls, and vulnerability management tools.
Solid grasp of Windows, Linux, cloud ecosystems, and secure network architecture.
Bonus points for automation/scripting chops (Python, PowerShell, etc.)
Experience working in a SOC or incident response team? Yes, please.
Soft Skills That Set You Apart:
A sharp mind and a calm hand in high-pressure situations.
Confidence talking tech with engineers and clarity explaining risk non-
tech execs.
Integrity and confidentiality are second nature.
Love for fast-paced environments where the stakes are high and the mission matters.
This isn't just a job. It's a mission.
If you're ready to lock shields, lead the charge, and make a real impact, let's talk.
Cyber security analyst job in Redstone Arsenal, AL
Support the Missile Defense Agency (MDA) with development and analysis of programmatic data for program management support, to include monitoring and reporting against the acquisition program baselines, and assistance with program oversight and execution briefings. Alternative responsibilities may encompass development and execution of acquisition strategies/plans, contract requirements packages (e.g., writing SOWs, CDRLs, special provisions, source selection evaluation plans) and supporting prime contract monitoring/management activities. CompTIA Certification Preferred.
Certified Authorization Professional (CAP) certification (or ability to attain within 90 days after employment)
Provide interpretation and execution of MDA Acquisition policy, directives, guidance, and instructions
Provide program management support in developing, maintaining, and reporting against program baselines, gathering and analyzing programmatic data for internal Agency oversight reviews of programs (e.g., MDAR, DPR, PER, PMRs, internal reviews)
Prepare briefings and correspondence in response to internal taskings and external RFIs (e.g., GAO/Congressional/DoDIG/DoD oversight organizations)
Analyze acquisition requirements and provide recommendations during pre-solicitation phase through contract execution
Support program and contract management processes through the preparation and/or review of acquisition and program management documentation, briefings, white papers, reports, metrics
Provide support through all phases of the acquisition cycle with an emphasis on cybersecurity throughout the process
Requirements
Prior MDA experience preferred.
Advanced level - Master's degree required and/or 15 years' experience
Intermediate level - Bachelor's degree required and/or 10 years' relevant experience
Knowledge and experience in acquisition, procurement, and contracting highly desirable
Solid background in MS Office tools suite (e.g., Word, Excel, PowerPoint, Access) essential
Must possess exceptionally strong communications and analytical skills, be a self-starter, detail oriented, work well with a team, interacts with multiple levels and functional areas and able to manage customer and contractor relationship
SECRET or above Security Clearance required.
$64k-87k yearly est. 60d+ ago
Cyber Security Engineer/Information Systems Security Officer (ISSO)
Aerovironment 4.6
Cyber security analyst job in Huntsville, AL
AV is looking for a highly talented CyberSecurity Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of our team providing Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency (MDA).
Job Description:
+ Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages.
+ Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems.
+ Ensure that system security artifacts are developed, reviewed, and updated as needed.
+ Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS).
+ Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions.
+ Interface with other cyber teams to review RMF Contract Data Requirements List (CDRL) submissions and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts.
+ Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed.
+ Perform vulnerability/risk analysis of systems using expertise in relevant information systems security.
+ Track and monitor Plan of Action and Milestones (POA&M).
+ Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings.
+ Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle.
+ Track deliverables (i.e., artifacts, schedules, metrics).
Required:
+ Bachelor's degree and 7+ years of related professional experience.
+ Active Secret clearance.
+ DoD 8570 compliant IAM Level II certification is required (Security +)
+ Experience with DoD's RMF and SSP processes
Desired:
+ Experience with MDA specific RMF and SSP processes
+ Self-Motivated
+ Customer-oriented
**Clearance Level**
Secret
**ITAR Requirement:**
_T_ _his position requires access to information that is subject to compliance with the International Traffic Arms Regulations ("ITAR") and/or the Export Administration Regulations ("EAR"). In order to comply with the requirements of the ITAR and/or the EAR, applicants must qualify as a U.S. person under the ITAR and the EAR, or a person to be approved for an export license by the governing agency whose technology comes under its jurisdiction. Please understand that any job offer that requires approval of an export license will be conditional on AeroVironment's determination that it will be able to obtain an export license in a time frame consistent with AeroVironment's business requirements. A "U.S. person" according to the ITAR definition is a U.S. citizen, U.S. lawful permanent resident (green card holder), or protected individual such as a refugee or asylee. See 22 CFR § 120.15. Some positions will require current U.S. Citizenship due to contract requirements._
**Benefits** : AV offers an excellent benefits package including medical, dental vision, 401K with company matching, a 9/80 work schedule and a paid holiday shutdown. For more information about our company benefit offerings please visit: ********************************* .
We also encourage you to review our company website at ******************** to learn more about us.
Principals only need apply. NO agencies please.
**Who We Are**
Based in California, AeroVironment (AVAV) is a global leader in unmanned aircraft systems (UAS) and tactical missile systems. Founded in 1971 by celebrated physicist and engineer, Dr. Paul MacCready, we've been at the leading edge of technical innovation for more than 45 years. Be a part of the team that developed the world's most widely used military drones and created the first submarine-launched reconnaissance drone, and has seven innovative vehicles that are part of the Smithsonian Institution's permanent collection in Washington, DC.
Join us today in developing the next generation of small UAS and tactical missile systems that will deliver more actionable intelligence to our customers so they can proceed with certainty - and succeed.
**What We Do**
Building on a history of technological innovation, AeroVironment designs, develops, produces, and supports an advanced portfolio of unmanned aircraft systems (UAS) and tactical missile systems. Agencies of the U.S. Department of Defense and allied military services use the company's hand-launched UAS to provide situational awareness to tactical operating units through real-time, airborne reconnaissance, surveillance, and target acquisition.
_We are proud to be an EEO/AA Equal Opportunity Employer, including disability/veterans. AeroVironment, Inc. is an Equal Employment Opportunity (EEO) employer and welcomes all qualified applicants. Qualified applicants will receive fair and impartial consideration without regard to race, sex, color, religion, national origin, age, disability, protected veteran status, genetic data, sexual orientation, gender identity or other legally protected status._
**ITAR**
**About AV:**
**AV isn't for everyone. We hire the curious, the relentless, the mission-obsessed. The best of the best.**
We don't just build defense technology-we redefine what's possible. As the premier autonomous systems company in the U.S., AV delivers breakthrough capabilities across air, land, sea, space, and cyber. From AI-powered drones and loitering munitions to integrated autonomy and space resilience, our technologies shape the future of warfare and protect those who serve.
Founded by legendary innovator Dr. Paul MacCready, AV has spent over 50 years pushing the boundaries of what unmanned systems can do. Our heritage includes seven platforms in the Smithsonian-but we're not building history, we're building what's next.
**If you're ready to build technology that matters-with speed, scale, and purpose-there's no better place to do it than AV.**
**Careers at AeroVironment (*****************************************
$61k-79k yearly est. 5d ago
Cyber Security Analyst 2
Us Tech Solutions 4.4
Cyber security analyst job in Birmingham, AL
+ This position provides support to the Grid Operations and Planning Research area within client Company's Research & Development. + The engineer will support projects and in time lead efforts to deploy and evaluate the performance of emerging technologies in this arena.
+ The position is focused on cyber-physical security research for Transmission and Distribution.
+ The engineer will support cyber-physical security projects with power system and cyber modeling, simulation, and analyses to identify and characterize threats, and vulnerabilities and develop mitigation approaches.
+ Data from various sources and analytics tools will be leveraged to develop models to characterize normal power system and cyber data to facilitate the identification of anomalous events.
+ Working knowledge of intrusion detection, risk assessment frameworks, databases, data structures, computer networking is required as well as an aptitude to apply engineering analysis to solve problems.
**Description:**
+ This position supports the Schatz Grid Visualization and Analytics Center (SGVAC) within client Company's Research & Development department.
+ The SGVAC is an innovation center that facilitates the research, pre-operational development and assessment and demonstration of situational awareness technologies for Transmission and Distribution.
+ Areas of focus include synchrophasor technology, next generation control center functionalities, cybersecurity testing, new visualization approaches, DERMS platform evaluation, data analytics as well as modeling and simulation including via a Real Time Digital Simulator (RTDS) with hardware-in-the-loop testing capability.
**Qualification Requirements**
+ Experience in cybersecurity, including cybersecurity modeling and simulation
+ Experience with intrusion detection and risk assessment frameworks is required
+ Experience in power system modeling and simulation
+ Experience with data analytics including machine learning required
+ Experience with computer programming (Python, C#, SQL) desired
**Job Responsibilities:**
+ Develop research plan to evaluate new technology
+ Manage multiple tasks at one time
+ Provide documentation of study assumptions and methods used to arrive at results
+ Provide informative reports and presentations on projects
+ Some overnight travel may be required but this is not extensive.
**Other Knowledge, Skills & Abilities**
+ Must demonstrate good communication skills, both internal and external to the company
+ Must have excellent organizational skills
+ Must possess analytical skills as well as the ability to manage multiple projects simultaneously
+ Must work well in a team environment
+ Must have the ability to manage your own work schedule and work with limited direction
+ Must have strong initiative - a self-starter
+ Must be great at problem solving
**Education:**
+ Bachelors in computer science, computer engineering, cybersecurity, information systems, electrical engineering or related field required
+ Advanced degree in EE, computer science or other related fields strongly preferred.
**About US Tech Solutions:**
US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit *********************** (*********************************** .
US Tech Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, colour, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
$67k-89k yearly est. 60d+ ago
Defensive Analyst (Football)
MSU Jobs 3.8
Cyber security analyst job in Starkville, MS
Provides high-level administrative support to the football coaching staff as assigned in support of the defensive initiatives of the football program at Mississippi State University as well as assist in maintaining relationships with high school coaches around the state.
Salary Grade: 16
Please see Staff Compensation Structure for salary ranges.
Essential Duties and Responsibilities:
1. Scout football team's in-season games.
2. Breakdowns game film and provides full statistical analysis of defense.
3. Scout football team's practices in fall, spring and in-season.
4. Provides statistical analysis of defense.
5. Consistently maintain communication with head school coaches from around the State of Mississippi, serving as a liaison for the Mississippi State Coaching Staff in helping to identify high school prospects.
6. Host high school and junior college coaches throughout Spring and Summer at practices and other functions.
7. Perform other duties assigned by the Head Football Coach, Defensive Coordinator, and Associate Athletic Director for Football.
Minimum Qualifications:
Bachelor's degree with five (5) years of experience in related field.
Knowledge, Skills, and Abilities:
• Ability to function independently solving problems and making decisions.
• Ability to prioritize and schedule work for efficient operations.
• Ability to work a flexible schedule to include nights and weekends.
• Must have excellent oral and written communication skills.
• Ability to travel extensively.
Working Conditions and Physical Effort
• No unusual physical requirements. Requires occasional or light lifting, nearly all work is performed in a comfortable indoor facility.
• Frequent externally imposed deadlines; set and revised beyond one's control; interruptions influence priorities; difficult to anticipate nature or volume of work with certainty beyond a few days; meeting of deadlines and coordination of unrelated activities are key to position; involves conflict-resolution or similar interactions involving emotional issues or stress on a regular basis.
• Job occasionally requires walking, sitting, reaching, talking, hearing, handling objects with hands.
• Job occasionally requires standing, stooping/kneeling/crouching/crawling, and lifting up to 25 pounds.
• Vision requirements: Ability to see information in print and/or electronically.
Instructions for Applying:
Please attach your Resume and cover letter to the Application.
Equal Employment Opportunity Statement:
Mississippi State University is an equal opportunity institution. Discrimination is prohibited in university employment, programs or activities based on race, color, ethnicity, sex, pregnancy, religion, national origin, disability, age, sexual orientation, genetic information, status as a U.S. veteran, or any other status to the extent protected by applicable law. Questions about equal opportunity programs or compliance should be directed to the Office of Civil Rights Compliance, 231 Famous Maroon Band Street, P.O. 6044, Mississippi State, MS 39762, **************.
What do I do if I need an accommodation?
In compliance with the ADA Amendments Act (ADA), if you have a disability and would like to request an accommodation in order to apply for a position with Mississippi State University, please contact the Department of Human Resources Management at tel: ************** or *******************.
If you have any questions regarding this policy, contact the Department of Human Resources Management at ************** or *******************. Upon request, sections of this job listing are available in large print, and readers are available to assist the visually impaired.
Ready to launch your career? RGNext operates, maintains, and sustains mission-critical systems to provide safe and effective launch, testing, and tracking of Department of Defense, civil, commercial and international space lift vehicles. We support ballistic missile, guided weapon and aeronautical tests and evaluations as well as support space situational awareness operations and experiments to defend the United States to ensure our nation's safety. Our employees serve on the forefront of global defense and space operations. We offer our team of experienced, professional employees an environment of challenging, stimulating and personally and professionally rewarding career opportunities.
This position is located on Kwajalein Atoll in the Marshall Islands. It is an unaccompanied position (no family accommodations or pets). Benefits of this unique location include free housing, three meals a day and potential for U.S. overseas tax incentives.
Essential Functions
Perform comprehensive DISA STIG compliance evaluations and technical security control validations to ensure rigorous system hardening.
Execute daily monitoring and provide critical security posture briefings to the Cyber Operations Team Lead and RETS Cybersecurity Manager.
Draft and update Cyber Operations Standard Operating Procedures (SOPs), creating standardized, repeatable processes that significantly enhance team productivity and mission readiness.
Partner with cross-functional technical teams to provide expert guidance on remediation strategies and cybersecurity best practices.
Support investigations into potential security violations and policy breaches, executing the Incident Response Plan to ensure rapid mitigation and containment.
Collaborate with the Cyber Operations team to ensure technical compliance with security mandates from SMDC, NETCOM, C5ISR, and RETS leadership.
Maintain technical proficiency in emerging Cyber Operations tools and methodologies to adapt to evolving mission requirements and threat landscapes.
Execute additional technical functions and mission-critical tasks as assigned to support organizational security objectives.
Other duties as assigned.
Required Skills
Proven ability to communicate complex technical concepts clearly to diverse stakeholders and collaborate effectively with cross-functional teams to streamline workflows.
Proficient in producing high-quality Standard Operating Procedures (SOPs) and comprehensive technical reports.
Expert at conducting DISA Security Technical Implementation Guide (STIG) evaluations using STIG Viewer, Xylok Security Suite, and SCAP Compliance Checker (SCC), supplemented by meticulous manual checklist reviews.
Skilled at identifying, documenting, and tracking non-compliant items while providing actionable technical recommendations for remediation or risk mitigation.
Hands-on experience utilizing Tenable Security Center (ACAS) to perform vulnerability scans and cross-reference findings against current STIG requirements.
Proficient in analyzing Windows and Linux system event logs via Splunk (or similar SIEM tools) to validate security controls, detect unauthorized configuration changes, and identify indicators of compromise (IOCs).
Evaluates high-impact Change Requests as a key member of the Technical Review Board (TRB).
Required Experience
Bachelor's degree in computer science, cybersecurity, or related field; or equivalent combination of education and experience.
Two (2) or more years of experience in Information Assurance, Cybersecurity, or related field with a focus on similar responsibilities to those listed in the Essential Functions and Required Skills sections above.
Experience communicating security concerns and issues to non-technical audiences.
DoD 8140 Security+ certification required.
Additional Eligibility Qualifications
Must be able to obtain and maintain a DoD Secret Security Clearance which requires U.S. Citizenship.
Must be able to obtain/maintain a valid U.S. passport.
Must be able to relocate to the United States Army Kwajalein Atoll, Marshall Islands.
The flexibility to work occasional non-duty hours or on weekends to support specific mission or project requirements.
Benefits of Working at RGNext
RGNext offers our team of experienced, professional employees an environment of challenging, stimulating and personally and professionally rewarding career opportunities and growth. Employees enjoy a robust benefit package on day one, which includes medical, dental, vision, disability and life insurances, generous Paid Time Off and holiday pay, a retirement savings plan with a company match and vesting on day one! We are committed to providing employees a quality work/life balance in a productive, evolving environment.
Note: This job description describes the general nature of the duties and requirements of the job. It is not intended to be an exhaustive list or to limit the supervisor's ability to modify work assignments as appropriate.
RGNext is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, or any other applicable state or federal protected class.
$55k-82k yearly est. Auto-Apply 4d ago
Cyber Security Compliance Specialist
JS Solutions 4.2
Cyber security analyst job in Huntsville, AL
Job DescriptionSalary:
CyberSecurity Compliance Specialist
Company: JS Solutions
About Us: JS Solutions, LLC is a Huntsville-based, veteran-owned business dedicated to delivering innovative, mission-focused solutions to our government and commercial partners. Our team specializes in government acquisition support, cybersecurity compliance, and strategic business development. We are committed to helping our clients meet complex requirements with confidence and efficiency.
Position Overview:
JS Solutions is seeking a motivated and detail-oriented Junior Cyber Compliance Specialist to join our growing team in Huntsville, AL. This role is ideal for early-career professionals who are eager to build expertise in cybersecurity frameworks, with a focus on CMMC, NIST, and DoD compliance requirements. The successful candidate will support compliance initiatives, assist with documentation, and contribute to ensuring our clients achieve and maintain the highest standards of cybersecurity readiness.
Responsibilities:
Assist with the development, review, and maintenance of cybersecurity compliance documentation (policies, procedures, plans, and artifacts).
Support compliance assessments against frameworks such as CMMC, NIST 800-171, DFARS, and FedRAMP.
Collect and organize evidence to demonstrate compliance for audits and assessments.
Track and update compliance tasks, ensuring deliverables are met on time.
Conduct research on evolving federal cybersecurity requirements and provide recommendations to senior staff.
Work closely with clients to understand compliance gaps and support remediation efforts.
Provide administrative and technical support to senior compliance specialists.
Qualifications:
Bachelors degree in Cybersecurity, Information Systems, Computer Science, or related field; or equivalent work experience.
02 years of professional experience in cybersecurity, compliance, or IT (internships and academic projects accepted).
Familiarity with cybersecurity frameworks such as NIST 800-171, CMMC, or ISO 27001 preferred.
Strong organizational skills and attention to detail.
Excellent written and verbal communication skills.
Ability to work independently as well as part of a team.
CompTIA Security+, Certified CMMC Professional (CCP), or similar entry-level certification.
Prior experience supporting DoD or government cybersecurity programs.
BENEFITS
Health, Supplemental Health, Vision, and Dental Insurance
401K Matching
Short-term and Long-term Disability Insurance
Paid Time Off (PTO)
Why Join JS Solutions?
Be part of a fast-growing, veteran-owned company with a mission-driven culture.
Gain hands-on experience with cutting-edge cybersecurity compliance projects.
Competitive compensation and benefits package.
Opportunities for professional development and career advancement.
JS Solutions is an Equal Opportunity Employer that does not discriminate based on actual or perceived race, color, creed, religion, national origin, ancestry, citizenship status, age, sex or gender (including pregnancy, childbirth, and pregnancy-related conditions), gender identity or expression (including transgender status), sexual orientation, marital status, military service and veteran status, physical or mental disability, genetic information, or any other characteristic protected by applicable federal, state, or local laws and ordinances. The management team is dedicated to this policy regarding recruitment, hiring, placement, promotion, transfer, training, compensation, benefits, employee activities, access to facilities, and general treatment during employment.
$70k-89k yearly est. 21d ago
Security Analyst
PNC 4.1
Cyber security analyst job in Birmingham, AL
At PNC, our people are our greatest differentiator and competitive advantage in the markets we serve. We are all united in delivering the best experience for our customers. We work together each day to foster an inclusive workplace culture where all of our employees feel respected, valued and have an opportunity to contribute to the company's success. As a Security Staff Manager within PNC's CYBER DEFENSE organization, you will be based in Pittsburgh, PA.
PowerShell
Python or Bash
IP addressing
Routing basics
- The candidate should have familiarity with the process of registering, maintaining, and decommissioning domains.
- The candidate should have experience managing domain inventory for a large enterprise/corporation.
- The candidate should have an understanding of DNS, ICANN, networking, and internet infrastructure.
Role responsibilities:
- This candidate will be a founding member of a newly formed team focused on the management of PNC's enterprise domain inventory.
- In this role, the candidate will partner with internal teams to develop a system of record, implement an enterprise-wide policy for governance, and ensure that the complete domain lifecycle (creation, maintenance, decommissioning) is accounted for in processes and procedures.
- The candidate will work closely with the lines of businesses, technology, and security teams to develop an accurate domain inventory.
- The candidate should have familiarity with the process of registering, maintaining, and decommissioning domains.
- The candidate should have experience managing domain inventory for a large enterprise/corporation.
- The candidate should have an understanding of DNS, ICANN, networking, and internet infrastructure.
PNC will not provide sponsorship for employment visas or participate in STEM OPT for this position.
In office.
Monday - Friday 8:00 am - 5:00 pm EST
PNC will not provide sponsorship for employment visas or participate in STEM OPT for this position.
PNC will not provide sponsorship for employment visas or participate in STEM OPT for this position.
**Job Description**
+ Provides technical evaluation and analysis. Supports activities, process, and tools needed to improve overall security posture of the organization.
+ Applies security concepts, reviews information, executes defined tasks, analyzes requirements, reviews logs, and creates documentation. Performs investigation and data loss prevention, data manipulation, and coordination of activities. Performs actions to address or mitigate risks and vulnerabilities. Reviews and defines controls.
+ Advises on more complex security procedures and products for clients, security administrators and network operations. Participates in enforcement of control security risks and threats; potential of one more controls subject to manager discretion. Shares knowledge with staff.
+ Conducts security assessments and other information security routines consistently. Investigates and recommends corrective actions for data security related to established guidelines.
PNC Employees take pride in our reputation and to continue building upon that we expect our employees to be:
+ **Customer Focused** - Knowledgeable of the values and practices that align customer needs and satisfaction as primary considerations in all business decisions and able to leverage that information in creating customized customer solutions.
+ **Managing Risk** - Assessing and effectively managing all of the risks associated with their business objectives and activities to ensure they adhere to and support PNC's Enterprise Risk Management Framework.
**Qualifications**
Successful candidates must demonstrate appropriate knowledge, skills, and abilities for a role. Listed below are skills, competencies, work experience, education, and required certifications/licensures needed to be successful in this position.
**Preferred Skills**
Access Control (AC), Bash (Programming Language), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, IP Addressing, Microsoft PowerShell, Network Security, Physical Security, Python (Programming Language), Risk Assessments, Security Technologies
**Competencies**
Analytical Thinking, Effective Communications, Information Assurance, Information Security Management, Information Security Technologies, IT Environment, IT Standards, Procedures & Policies, IT Systems Management, Problem Solving, Software Security Assurance
**Work Experience**
Roles at this level typically require a university / college degree, with 3+ years of relevant / direct industry experience. Certifications are often desired. In lieu of a degree, a comparable combination of education, job specific certification(s), and experience (including military service) may be considered.
**Education**
Bachelors
**Certifications**
No Required Certification(s)
**Licenses**
No Required License(s)
**Pay Transparency**
Base Salary: $55,000.00 - $128,000.00
Salaries may vary based on geographic location, market data and on individual skills, experience, and education. This role is incentive eligible with the payment based upon company, business and/or individual performance.
**Application Window**
Generally, this opening is expected to be posted for two business days from 01/12/2026, although it may be longer with business discretion.
**Benefits**
PNC offers a comprehensive range of benefits to help meet your needs now and in the future. Depending on your eligibility, options for full-time employees include: medical/prescription drug coverage (with a Health Savings Account feature), dental and vision options; employee and spouse/child life insurance; short and long-term disability protection; 401(k) with PNC match, pension and stock purchase plans; dependent care reimbursement account; back-up child/elder care; adoption, surrogacy, and doula reimbursement; educational assistance, including select programs fully paid; a robust wellness program with financial incentives.
In addition, PNC generally provides the following paid time off, depending on your eligibility: maternity and/or parental leave; up to 11 paid holidays each year; 9 occasional absence days each year, unless otherwise required by law; between 15 to 25 vacation days each year, depending on career level; and years of service.
To learn more about these and other programs, including benefits for full time and part-time employees, visit Your PNC Total Rewards (******************************* .
**Disability Accommodations Statement**
If an accommodation is required to participate in the application process, please contact us via email at AccommodationRequest@pnc.com . Please include "accommodation request" in the subject line title and be sure to include your name, the job ID, and your preferred method of contact in the body of the email. Emails not related to accommodation requests will not receive responses. Applicants may also call ************ and say "Workday" for accommodation assistance. All information provided will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
At PNC we foster an inclusive and accessible workplace. We provide reasonable accommodations to employment applicants and qualified individuals with a disability who need an accommodation to perform the essential functions of their positions.
**Equal Employment Opportunity (EEO)**
PNC provides equal employment opportunity to qualified persons regardless of race, color, sex, religion, national origin, age, sexual orientation, gender identity, disability, veteran status, or other categories protected by law.
This position is subject to the requirements of Section 19 of the Federal Deposit Insurance Act (FDIA) and, for any registered role, the Secure and Fair Enforcement for Mortgage Licensing Act of 2008 (SAFE Act) and/or the Financial Industry Regulatory Authority (FINRA), which prohibit the hiring of individuals with certain criminal history.
**California Residents**
Refer to the California Consumer Privacy Act Privacy Notice (****************************************************************************************************** to gain understanding of how PNC may use or disclose your personal information in our hiring practices.
$55k-128k yearly 6d ago
CYBER SECURITY ENGINEER
Reliant Technology 3.7
Cyber security analyst job in Huntsville, AL
Ignite is an ISO 9001:2015 and CMMI Services Level 3 certified, Service-Disabled Veteran-Owned Small Business (SDVOSB), headquartered in Huntsville, AL. By design, Ignite is a provider of professional services to customers in educational, federal, and commercial industries and in every action seeks to be the preeminent provider within this business space. Ignite upholds our values of competency, collaboration, innovation, reliability, and results through everything we do.
Ignite is currently seeking a driven, detail-oriented CyberSecurity Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of Parsons' Federal Solutions team providing Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency.
Job Requirements
Responsibilities include, but are not limited to:
* Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages.
* Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems.
* Ensure that system security artifacts are developed, reviewed, and updated as needed.
* Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS).
* Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions.
* Interface with other cyber teams to review RMF Contract Data Requirements Lists (CDRLs) and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts.
* Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed.
* Perform vulnerability/risk analysis of systems using expertise in relevant information systems security.
* Track and monitor Plan of Action and Milestones (POA&Ms).
* Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings.
* Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle.
* Track deliverables (i.e., artifacts, schedules, metrics).
Required Qualifications
* Bachelor's degree and 7+ years of related professional experience.
* Active Secret clearance
* DoD 8570 compliant IAM Level II certification is required (Sec +)
* Experience with DoD's RMF and SSP processes
Desired Qualifications
* Experience with MDA specific RMF and SSP processes
* Self-Motivated
* Customer-oriented
Security Clearance Requirements:
Must have an active Secret Security Clearance
Education Requirements:
* Bachelor's Degree
Other Requirements:
Must be a US citizen and be able to hold an active Security Clearance at the Secret Level.
We are equal opportunity/affirmative action employers, committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or protected veteran status, or any other protected characteristic under state or local law.
Accommodation Request: If you are a qualified individual with a disability or are a disabled veteran and are unable or limited in your ability to use or access our Careers sites as a result of your disability, you have the right to receive assistance in completing the application process. Please send your request to **********************
$75k-101k yearly est. 9d ago
Cybersecurity Intrusion Detection Analyst
UIC Government Services and The Bowhead Family of Companies
Cyber security analyst job in Vicksburg, MS
Bowhead is seeking a Lead Cybersecurity Intrusion Detection Analyst to join our team in Vicksburg, MS. The Cybersecurity Intrusion Detection Analyst use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. They provide on-site 24x7x365 operational support in the form of event/incident handling and analysis capability to cybersecurity service subscribers. These highly skilled individuals will work in various capacities alongside Warning Intelligence Analysts and Engineers. The Cybersecurity Intrusion Detection Analyst will work in the Attack Sensing and Warning (AS&W) division which senses changes in subscriber networks through comparison to established baselines and the fusion/integration of closed and open source intelligence to enhance sensing capability. They will perform the analysis of disparate data sources to form a cohesive view of the current cybersecurity state. They will characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. These positions are in a 24x7x365 Cybersecurity environment and qualified candidates must be able to work 12 hour shifts - day or night on a Panama schedule.
**Responsibilities**
+ Provides leadership and supervision to the incident response staff and performs highly technical customer support to organization users.
+ Manages the incident response and threat detection function.
+ Proactively analyzes network and systems traffic, event logs, and threat intelligence data, to properly identify and triage susceptibility of core campus technical assets, determine likelihood of exploitation and implement and/or refine preventative and detective security controls
+ Participates in the development and monitoring of policies and procedures for department or department operations.
+ Assesses, analyzes, and consults on the security of information assets - networks, endpoints, databases, applications, services, platforms, environments, etc. Contributes to asset inventory and categorization processes.
+ Receive and distribute AS&W information
+ Conduct AS&W activities to develop appropriate response (receives and archive task orders, directives, and other required actions,
+ Maintain internal and external source location information)
+ Coordinate AS&W information from other sources to aid in analysis of alerts.
+ Analyze the Intrusion Detection System alerts to identify unauthorized or anomalous activity.
+ Identify, documents, and reports unauthorized activity/attacks (including IP addresses and ports, attack vector, and attack timeframe) in all incidents and reports per HPCMP CSSP sops.
+ Take action, if appropriate, to prevent or mitigate potential impact to the DODIN based on cyber threats, and develop and distribute countermeasures and interim guidance to prevent or mitigate threats and/or attacks on DODIN.
+ Monitor a platform capable of performing information security continuous monitoring (ISCM) for the purposes of detecting cyber intrusions, attacks, anomalous behavior, and possible insider threats.
+ Collect intrusion artifacts (e.g., source code, malware, and trojans)
+ Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
+ Report incidents and events within proper channels and within timelines identified in the CJCSM 6510.01B
+ Provide a 24/7x365 event/incident handling and analysis capability;
+ Provide operations log accessible to personnel documenting all mandated reportable cyber events/incidents;
+ Analyze detected cyber events to identify incidents;
+ Categorize and characterize cyber incidents;
+ Notify affected Subscribers of cyber incidents and collect assessments of mission impact for the loss of the system during the incident response process;
+ Analyze cyber incidents to develop specific responses;
+ Distribute tailored countermeasures or interim guidance to Subscribers to eradicate and prevent cyber incidents across all subscribers;
+ Perform forensic analysis of systems and malware in cases where subscribers lack the capability and ensure relevant IOCs are shared with Warning Intelligence;
+ Mitigate operational and/or technical impact due to cyber incidents;
+ Contain the spread of malware to prevent further damage to IT systems through detection, analysis, and execution of containment measures.
**Qualifications**
+ Must possess Bachelor's degree or equivalent experience.
+ Must have at least 5 years intrusion detection experience.
+ Must have at least 2 years relevant IT and/or System administrator experience and 3 years relevant Information Security experience
+ Must have the certifications for DOD 8570 IAT Level II minimally.
+ Must have the certifications for DOD 8570 CSSP-Analyst or CSSP-Incident Responder.
+ Must have the ability to earn DoD 8570 computing environment certification within 6 months.
+ Understanding of network hardware devices and experience configuring Access Control Lists or other Firewall or Router configuration experience
+ Ability to demonstrate strong knowledge of computer security concepts
+ Ability to communicate effectively, interpret regulatory guidance and identified vulnerabilities to a wide audience.
+ Advanced knowledge of network technologies and protocols
+ Advanced understanding of current threats and trends present in the Information Security and Technology field
+ Must complete the specified Joint Qualification Requirement training within 180 days of date of hire, unless otherwise specified.
SECURITY CLEARANCE REQUIRED: Must currently hold and be able to maintain an active Secret clearance with the ability to obtain a Top Secret/SCI. US Citizenship is a requirement for Secret clearance at this location.
Physical Demands:
- Must be able to lift up to 25 pounds
- Must be able to stand and walk for prolonged amounts of time
- Must be able to twist, bend and squat periodically
\#LI-MN1
Applicants may be subject to a pre-employment drug & alcohol screening and/or random drug screen, and must follow UIC's Non-DOT Drug & Alcohol Testing Program requirements. If the position requires, an applicant must pass a pre-employment criminal background history check. All post-secondary education listed on the applicant's resume/application may be subject to verification.
Where driving may be required or where a rental car must be obtained for business travel purposes, applicants must have a valid driver license for this position and will be subject to verification. In addition, the applicant must pass an in-house, online, driving course to be authorized to drive for company purposes.
UIC is an equal opportunity employer. We evaluate qualified applicants without regard to race, age, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other protected characteristics EOE/D/V. In furtherance, pursuant to The Alaska Native Claims Settlement Act 43 U.S.C. Sec. 1601 et seq., and federal contractual requirements, UIC and its subsidiaries may legally grant certain preference in employment opportunities to UIC Shareholders and their Descendants, based on the provisions contained within The Alaska Native Claims Settlement Act. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities. Please view Equal Employment Opportunity Posters provided by OFCCPhere (******************************************* .
All candidates must apply online at ***************** , and submit a completed application for all positions they wish to be considered. Once the employment application has been completed and submitted, any changes to the application after submission may not be reviewed. Please contact a UIC HR Recruiter if you have made a significant change to your application. In accordance with the Americans with Disabilities Act of 1990 (ADA), persons unable to complete an online application should contact UIC Human Resources for assistance *****************/careers/recruitment/ .
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
UIC Government Services (UICGS / Bowhead) provides innovative business solutions to federal and commercial customers in the areas of engineering, maintenance services, information technology, program support, logistics/base support, and procurement. Collectively, the fast-growing Bowhead Family of Companies offers a breadth of services which are performed with a focus on quality results. Headquartered in Springfield, VA, we are a fast-growing, multi-million-dollar company recognized as a top Alaska Native Corporation providing services across the Department of Defense and many federal agencies. Bowhead offers competitive benefits including medical, dental, vision, life insurance, accidental death and dismemberment, short/long-term disability, and 401(k) retirement plans as well as a paid time off programs for eligible full-time employees. Eligible part-time employees are able to participate in the 401(k) retirement plans and state or contract required paid time off programs.
**Join our Talent Community!**
Join our Talent Community (************************************************************************ to receive updates on new opportunities and future events.
**ID** _2026-24447_
**Category** _Cybersecurity/Information Security_
**Location : Location** _US-MS-Vicksburg_
**Clearance Level Must Be Able to Obtain** _Top Secret/SCI_
**Minimum Clearance Required** _Secret_
**Travel Requirement** _Less than 10%_
$66k-94k yearly est. 9d ago
Sr. Security Analyst
Maximus 4.3
Cyber security analyst job in Birmingham, AL
Description & Requirements Maximus is seeking a qualified Sr. Technical/SecurityAnalyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned.
*This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. *
Essential Duties and Responsibilities:
- Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary.
- Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget.
- Work closely with management and work groups to create and maintain work plan documents.
- Track the status and due dates of projects.
- Manage relationships with project staff responsible for projects.
- Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed.
- Facilitate regular meetings and reviews.
- Adhere to contract requirements and comply with all corporate policies and procedures.
Job Specific Duties and Responsibilities:
-Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects.
-Review project documentation and client materials and provide analysis of technical and security related topics.
-Participate in client meetings and offer observations and insight on technical and security related topics.
-Identify risk areas and potential problems that require proactive attention.
-Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to:
*System Security Plan
*Plan of Action and Milestones (POA&M)
*Security Assessment Plan
*Risk Assessment reports
*CMS ARC-AMPE forms and documentation
*Data Conversion and Migration Management Plan
*Deployment and/or roll-out plans
-Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects.
-Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues.
-Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work.
-Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager.
-Complete project work in compliance with Maximus standards and procedures.
-Support team to complete assigned responsibilities as outlined in the Project schedule.
-Support all other tasks assigned by Senior Manager / Project Manager.
Minimum Requirements
- Bachelor's degree in related field.
- 7-10 years of relevant professional experience required.
- Equivalent combination of education and experience considered in lieu of degree.
Job Specific Requirements:
-Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required.
-Bachelor's degree from an accredited college or university, or equivalent work experience.
-7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry.
-5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks.
-Familiar with operating systems: Windows, Linux/UNIX, OS/X.
-Familiar with AI tools, capabilities.
-Strong command of cloud computing topics.
-Strong command of agile software development practices as well as waterfall development practices.
-Strong desktop software skills: proficient in MS Office, Excel, Word, Project.
-Ability to explain and communicate technical subjects to non-technical audiences.
-Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills.
-Ability to work independently.
-Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously.
-Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential.
-Excellent verbal and writing skills and be comfortable working with customers.
-Ability to multi-task with supervision.
-Self-motivated fast learner.
Preferred Skills:
-Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid).
-Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional).
EEO Statement
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Accommodations
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
Minimum Salary
$
120,000.00
Maximum Salary
$
140,000.00
Thank you for your interest in a career at Regions. At Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career --- a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice.
Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law. Such information will be stored in accordance with regulatory requirements and in conjunction with Regions' Retention Schedule for a minimum of three years. You may review, modify, or update your information by visiting and logging into the careers section of the system.
:
At Regions, the CyberSecurity Engineer supports applicable services for cloud applications, infrastructure, platform security, and related technologies within the CyberSecurity organization. The engineer at this level is considered a subject-matter expert (SME) utilizing extensive experience and technical knowledge and may lead complex projects as necessary.
Primary Responsibilities
Utilizes extensive knowledge in the design, implementation, and support of relevant cybersecurity technology solutions
Provides technical administration to include troubleshooting support, break-fix operations, patching, and other day-to-day activities for relevant applications
Stays abreast of industry trends and investigates organizational objectives and needs, ensuring team mutual knowledge and awareness
Reviews and maintains operational documentation and reports to support monthly trend analysis as well as project components
Leads research, proof-of-concept, selection, and implementation of technology solution
Conducts an advanced level of analysis of pros and cons and build vs buy options, offering opinion to management regarding disputes and contrasts
Explores implementation of new technologies, solutions, and methods to improve business processes, efficiency, effectiveness, and value delivered to customers
Leads the examination of technology vision, opportunities and challenges regarding security standards and the impact of the technology within the CyberSecurity organization
Develops and maintains relevant metrics, controls, and other governance administration related to cybersecurity technology
Participates in on-call rotation for the support of any relevant cybersecurity technologies
Assists management collaborating with other teams on projects, ensuring alignment with the goals and objectives of the CyberSecurity organization
Works jointly with management to assist in the development of technical skills and knowledge among team, ensuring the organization has adequate resources to ensure the safety and protection of Regions' technology and assets
Serves as a mentor to team members
Acts as a role model in adhering to operational processes, standards, and procedures
May serve as a leader in security incident response activities and post-event reviews of security incidents
May serve as the subject-matter expert regarding design, implementation, and maintenance of relevant cybersecurity solutions to business areas, project teams, and vendors
May lead complex projects as assigned by management
This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay.
Requirements
High School Diploma or GED and ten (10) years of related post-secondary education and/or experience in Information Security and/or Information Technology
Preferences
Bachelor's degree in Information Technology, Information Security, Information Systems Management, Computer Science, Engineering, or related field
Experience within a Cyber and/or Information Security organization within the financial services industry
Applicable technology and/or security certifications (e.g. Certified Information Systems Security Professional (CISSP), CompTIA Security+, Cisco Certified Network Associate (CCNA), Microsoft Certified Solutions Associate (MCSA), etc.)
Skills and Competencies
Ability to prioritize conflicting demands
Ability to work independently
Advanced analytical and evaluative thinking capability
Advanced knowledge of modern security tools and controls
Advanced problem-solving skills to offer sound solutions to complex issues
Strong knowledge of common web technologies, cloud technologies, and enterprise and network architecture
Strong knowledge of defense in depth, trust levels, privileges, and permissions
Strong verbal, written communication, and organizational skills
Additional Job Description
For this position, we are looking for a well-rounded CyberSecurity Engineer with the additional skills below:
AWS Expertise: Deep understanding and hands-on experience with various AWS services, including but not limited to AWS WAF & Shield, Firewall Manager, EC2, S3, VPC, IAM, RDS, Lambda, CloudWatch, SQS, SNS, and CloudFormation.
Terraform Proficiency: Proven experience in designing, implementing, and managing infrastructure as code (IaC) using Terraform. This includes writing reusable modules, managing state, and integrating with CI/CD pipelines.
Programming Language Fluency: Strong proficiency in at least one relevant programming language such as Python, Go, Java, or Node.js for developing automation scripts, custom tools, and integrating with AWS APIs.
DevOps Practices: Solid understanding and practical experience with DevOps principles, including CI/CD pipelines, version control (Git), and automation tools.
Networking and Security: Knowledge of AWS networking concepts (VPCs, subnets, routing, security groups) and security best practices within the AWS environment.
Certifications (Optional but advantageous): AWS certifications (e.g., AWS Certified Solutions Architect, AWS Certified DevOps Engineer) and HashiCorp Certified: Terraform Associate
This position is intended to be onsite, now or in the near future. Associates will have regular work hours, including full days in the office three or more days a week. The manager will set the work schedule for this position, including in-office expectations. Regions will not provide relocation assistance for this position, and relocation would be at your expense. This position must be within a reasonable driving distance to Birmingham, AL, Atlanta, GA, Nashville, TN or Charlotte, NC. Exceptions to the geographic location requirement may be made for current Regions associates who work remotely.
Position Type
Full time
Compensation Details
Pay ranges are job specific and are provided as a point-of-market reference for compensation decisions. Other factors which directly impact pay for individual associates include: experience, skills, knowledge, contribution, job location and, most importantly, performance in the job role. As these factors vary by individuals, pay will also vary among individual associates within the same job.
The target information listed below is based on the Metropolitan Statistical Area Market Range for where the position is located and level of the position.
Job Range Target:
Minimum:
$131,292.70 USD
Median:
$172,090.00 USD
Incentive Pay Plans:
Opportunity to participate in the Long Term Incentive Plan.
Benefits Information
Regions offers a benefits package that is flexible, comprehensive and recognizes that "one size does not fit all" for benefits-eligible associates. Listed below is a synopsis of the benefits offered by Regions for informational purposes, which is not intended to be a complete summary of plan terms and conditions.
Paid Vacation/Sick Time
401K with Company Match
Medical, Dental and Vision Benefits
Disability Benefits
Health Savings Account
Flexible Spending Account
Life Insurance
Parental Leave
Employee Assistance Program
Associate Volunteer Program
Please note, benefits and plans may be changed, amended, or terminated with respect to all or any class of associate at any time. To learn more about Regions' benefits, please click or copy the link below to your browser.
*************************************************************
Location DetailsRiverchase Operations CenterLocation:Hoover, Alabama
Equal Opportunity Employer/including Disabled/Veterans
Job applications at Regions are accepted electronically through our career site for a minimum of five business days from the date of posting. Job postings for higher-volume positions may remain active for longer than the minimum period due to business need and may be closed at any time thereafter at the discretion of the company.
$131.3k-172.1k yearly Auto-Apply 60d+ ago
Cyber Security Engineer/ISSO
Waypoint Human Capital 4.1
Cyber security analyst job in Huntsville, AL
CyberSecurity Engineer / Information Systems Security Officer (ISSO) Position Type: Full-Time Onsite Huntsville, AL Clearance Required: Active Secret Waypoint's client is seeking an experienced CyberSecurity Engineer / ISSO to support the Ground-based Midcourse Defense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract. This role provides Systems Engineering Technical Assistance (SETA) to the Missile Defense Agency. The successful candidate will play a key role in cybersecurity engineering, Risk Management Framework (RMF) execution, and system authorization activities across the system lifecycle.
Responsibilities:
Serve as a member of the cybersecurity team supporting RMF implementation for assigned systems.
Develop, review, and maintain System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC), and Authority to Operate (ATO) packages.
Perform technical cybersecurity work utilizing the RMF process, including analysis and resolution of Information Assurance (IA)-related technical issues.
Ensure all RMF requirements are fully addressed and that required artifacts are properly loaded, tracked, and managed within Enterprise Mission Assurance Support Service (eMASS).
Conduct vulnerability and risk assessments using subject matter expertise in information systems security.
Track, manage, and monitor Plans of Action and Milestones (POA&Ms) to closure.
Interface with internal and external cyber teams to review RMF Contract Data Requirements Lists (CDRLs), ensuring timely delivery, accuracy, and quality of cybersecurity artifacts.
Review system audits, monitor corrective actions, and ensure findings are resolved and closed.
Conduct reviews of cybersecurity artifacts and technical briefings, working directly with the customer to resolve identified findings.
Verify that required security controls are implemented correctly and operating as intended throughout all phases of the system lifecycle.
Track cybersecurity deliverables, schedules, metrics, and reporting requirements.
Requirements:
Bachelor's degree in a relevant discipline.
7+ years of related professional experience in cybersecurity, information assurance, or systems security engineering.
Active DoD Secret security clearance.
DoD 8570 compliant IAM Level II certification (Security+ required).
Demonstrated experience with DoD RMF and SSP development and execution.
Strong analytical skills with the ability to identify root causes and develop effective, actionable solutions.
Strong written, verbal, and briefing skills.
Desired:
Experience with Missile Defense Agency (MDA)-specific RMF and SSP processes.
Prior experience supporting missile defense or large DoD acquisition programs.
Self-motivated, detail-oriented, and able to work independently in a fast-paced environment.
Customer-focused mindset with experience working directly with government stakeholders.
*Waypoint Human Capital is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation
$72k-97k yearly est. 6d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Jackson, MS
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 59d ago
Senior Security Analyst
Neptune Technology Group 4.4
Cyber security analyst job in Tallassee, AL
Neptune Technology Group Inc. is a technology company serving water utilities across North America. Since 1892, we have continually focused on the evolving needs of water utilities - revenue optimization, operational efficiencies, and improved customer service. With our portfolio of smart water meters, data collection systems and software, we make data actionable for our customers - so they can remain focused on the business of water. For additional information, please visit the company website at ******************
Senior SecurityAnalyst
Position Summary
As a Senior SecurityAnalyst, you will be a key member of Neptune's 24×7 Security Operations program, supporting incident response, SIEM management, and threat detection across a hybrid environment (on-prem, cloud, SaaS). You'll work closely with the SOC Manager to execute detection, response, and reporting processes that protect Neptune and meet compliance requirements.
Responsibilities:
Threat Detection & Monitoring
* Monitor and analyze security alerts from SIEM and EDR platforms
* Investigate anomalies and suspicious activity across endpoints, networks, and cloud environments
* Maintain high-fidelity alerting and reduce false positives through tuning
Incident Response & Management
* Execute playbooks for triage, containment, and remediation of security incidents
* Assist in forensic investigations and contribute to post-mortem reports
* Participate in tabletop exercises and readiness drills
SIEM & Security Logging
* Maintain SIEM health and ensure reliable telemetry across all assets
* Develop and refine detection rules and correlation logic
* Support automation and orchestration workflows for incident handling
Identity & Access Management
* Monitor identity-related events for anomalies and privilege escalation attempts
* Support IAM lifecycle processes and enforce least privilege principles
Threat Intelligence & Modeling
* Integrate threat intelligence feeds into detection workflows
* Assist in threat modeling to identify potential attack paths
Reporting & Metrics
* Document incidents and provide timely updates to SOC Manager for reporting to parent company
* Track and report operational metrics (MTTD, MTTR, alert volumes, etc.)
Security Standards & Architecture
* Apply secure-by-design principles in collaboration with engineering teams
* Support zero trust initiatives and network segmentation projects
Relevant Platforms (experience with several is expected):
* SIEM/SecOps: e.g. Google SecOps (Chronicle)
* EDR & Identity: e.g. CrowdStrike, Microsoft AD/Entra
* Network Security: e.g. FortiGate NGFW, FortiSASE
* Secure Browsing: e.g. Prisma
* Patching & Config: e.g. Automox
* Secrets Management: e.g. Keeper
* Asset Management: e.g. Axonius, Cyclops
* Email & Data Security: e.g. Mimecast, Microsoft Purview
Minimum Qualifications:
* Bachelor's degree (or equivalent experience)
* 3+ years in Security Operations or Incident Response
* Hands-on experience with SIEM, EDR, and threat detection
* Familiarity with NIST, ISO, MITRE ATT&CK, and zero trust principles
* Strong analytical and communication skills
Preferred Qualifications:
* Security certifications (e.g., GCIH, GCIA, CISSP)
* Experience with cloud security (AWS, Azure, GCP)
* Exposure to SOAR automation and scripting
* Travel Requirements: Typically requires overnight travel less than 10% of the time.
Travel Requirements: Typically requires overnight travel less than 10% of the time.
Location: Duluth, GA, Tallassee, AL
How much does a cyber security analyst earn in Tuscaloosa, AL?
The average cyber security analyst in Tuscaloosa, AL earns between $56,000 and $99,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Tuscaloosa, AL