Cyber-Security Analyst
Cyber Security Analyst Job 44 miles from Union City
Cyber Operations Specialist
Embark on a cutting-edge journey by joining our world-leading team as a Cyber Operations Specialist. Your prowess in cybersecurity will take center stage in safeguarding vital information and ensuring the security of our nation. Become a key player in fortifying our digital assets and upholding the confidentiality of sensitive information. In this role, you will be at the forefront of detecting and preventing cyber threats, implementing advanced security measures, and collaborating with a highly skilled team across diverse systems to ensure the organization achieves its mission with unparalleled technological prowess.
Requirements:
Attend a 55-week paid training program to gain skills and certifications in computer systems, network security, network traffic analysis, digital forensics, network security devices, communication network operations, and cyber operations.
Advanced certifications require additional full funded training programs.
Benefits:
Comprehensive Healthcare, Vision, and Dental plans.
30 days paid vacation.
90 days paid paternity and maternity vacation.
Comprehensive wellness programs including fitness facility access, nutrition consulting, curated fitness plans, and more.
Housing, clothing, and relocation allowance.
Tuition assistance.
Student loan repayment.
Flexible retirement and pension plans.
Pay and Promotion:
Entry pay and promotions vary based on education level and qualifications.
Hiring bonus opportunities available.
Specialty bonuses available depending on qualifications and position.
Guaranteed promotion opportunities.
Additional Career Opportunities:
Upon successful completion of first term contract, you are guaranteed up to 5 interviews with your choice 1,200 industry leading organizations including Charter Communications, Tesla, and Raytheon.
Similar Career Fields Include: Information Security Analyst, Network and Systems Administrator, and Cyber Defense Analyst.
About Our Organization:
The U.S. Army is wealth of possibilities for your future - whether you are looking to build a meaningful career, continue your education, or start a family, the Army is committed to helping you build the future you are looking for and improve yourself in the process. Be All You Can Be.
Now Hiring Full and Part Time Positions.
***Click apply for an Interview***
Security Analyst_ Atlanta, GA (W2 /Local)
Cyber Security Analyst Job 15 miles from Union City
Security Analyst
Contract/ Contract to Hire /Direct Client
Atlanta, GA
Minimum Qualifications:7
+ years of experience in Incident Response
Experience working in a 24/7 global enterprise environment; financial industry experience preferred.
SANS GIAC certifications (e.g., GCIA, GCIH, GCFA).
Proficiency with cloud platforms (AWS, Azure, or GCP).
Experience managing or maintaining malware analysis sandboxes.
Familiarity with malware analysis tools and techniques.
Scripting proficiency in Python and/or PowerShell.
Experience with Exabeam or other Security Information and Event Management (SIEM) tools.
Excellent communication and interpersonal skills.
Strong understanding of risk assessment in business contexts and the ability to mitigate risk without disrupting operations.
Ability to identify, analyze, and evaluate malicious code.
In-depth understanding of Windows operating systems and associated security implications.
Experience evaluating exploit codes relative to existing security controls.
Preferred Skills:
Strong understanding of networking protocols (e.g., TCP/IP, HTTP, SMTP).
Expertise in web application vulnerabilities and associated countermeasures.
Proficient in Unix/Linux operating systems.
Knowledge of key security infrastructure components: Firewalls, Intrusion Prevention Systems (IPS), Proxy Servers, Security Event Managers, VPNs.
Familiarity with web application technologies (HTML, JavaScript, etc.).
Ability to identify vulnerabilities in systems, networks, and applications using commercial tools and manual methods.
General knowledge of network and system forensics.
Deep knowledge of incident response frameworks, procedures, and best practices.
Working knowledge of threat intelligence and how it can be applied to enterprise security.
CISSP certification (Certified Information Systems Security Professional).
Willingness to provide 24/7 on-call support on a rotating basis
Key Responsibilities:
Lead the development and execution of security incident response plans and cyber forensic investigations
Produce comprehensive incident reports and investigation summaries
Gather and analyze threat intelligence to proactively detect and identify high-confidence threats targeting the organization
Analyze and validate security control configurations; tune, script, and implement mitigation rules to enhance protection
Troubleshoot and resolve issues related to detection and protection technologies
Evaluate existing tools, applications, and processes to strengthen and optimize security capabilities
Identify gaps in current processes and recommend technical solutions for improvement
Communicate complex technical issues and solutions clearly to both technical peers and executive management
Support compliance and governance efforts by contributing to security policies and regulatory initiatives
Review and analyze anomalous activity; work cross-functionally to remediate security events
Research, propose, and help implement practical security solutions that address emerging threats and compliance requirements
Will wait for your response.
Vishnu Singh
Email : ******************
Phone : ************
Blockchain Security Engineer
Cyber Security Analyst Job 15 miles from Union City
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our work culture is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
At Coinbase, security isn't just a priority. It's the foundation of everything we do. In the fast-evolving world of digital currency, where trust is paramount, security breaches can mean the difference between success and failure. That's why we've made security a cornerstone of our mission, setting the standard for protecting millions of customers and billions of dollars in assets.
As a Blockchain Security Engineer on the Decentralized Financial Security Team, you will work closely with engineers, technical product managers and senior leadership on designing secure products from the ground up. You will be responsible for performing secure design reviews, threat modeling, vendor reviews and secure code reviews for upcoming Coinbase products or features that will be used by millions of customers. You will have an opportunity to work on the latest technology and provide leadership visibility of the current risk posture. You'll also have an opportunity to pitch, lead and participate in cross-functional initiatives that uplevel the security of all Coinbase products and services.
What you'll be doing (ie. job duties): To be completed by all business teams except Eng.
Perform design reviews, threat modeling and code reviews of upcoming features and products.
Identify top product risk areas and lead risk-reduction initiatives with cross-functional teams.
Improve and/or automate existing processes to increase efficiency.
Participate in the team on-call rotation to support engineering teams through timely design consultations, vulnerability analysis, bug fix verification, etc.
What we look for in you (ie. job requirements): To be completed by all business teams except Eng.
Bachelor's degree in Computer Science
Expertise in Application Security and fundamental knowledge of cryptography
2+ years of threat modeling/design review experience
Strong communication skills with the ability to translate technical security requirements and risks into terms that anyone can understand.
Ability to work independently and unblock yourself.
Nice to haves:
MS or PhD in Computer Science or related field.
Experience in at least one of: Go, Ruby or Python.
Experience automating manual processes or carrying out process improvements.
Experience in Blockchain, Exchange, or Decentralized Exchange Security.
ID: P69496
Pay Transparency Notice: Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include target bonus + target equity + benefits (including medical, dental, vision and 401(k)).
Pay Range:
$152,405-$179,300 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is committed to diversity in its workforce and is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the Know Your Rights notice here. Additionally, Coinbase participates in the E-Verify program in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations[at]coinbase.com to let us know the nature of your request and your contact information. For quick access to screen reading technology compatible with this site click here to download a free compatible screen reader (free step by step tutorial can be found here).
Global Data Privacy Notice for Job Candidates and Applicants
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available here. By submitting your application, you are agreeing to our use and processing of your data as required. For US applicants only, by submitting your application you are agreeing to arbitration of disputes as outlined here.
Benefits at Coinbase
Medical Plan, Dental and Vision Plan with generous employee contributions
Health Savings Account with company contributions each pay period
Disability and Life Insurance
401(k) plan with company match
Wellness Stipend
Mobile/Internet Reimbursement
Connections Stipend
Volunteer Time Off
Fertility Counseling and Benefits
Generous Time off/Leave Policy
The option of getting paid in digital currency
Learn more about our mission
Cyber Threat Analyst
Cyber Security Analyst Job 15 miles from Union City
Job Description Requires extensive knowledge of computer operating systems, networks, log analysis and security tools. Applies engineering principles to cybersecurity challenges. Necessary skill areas: fundamentals of computer science, information analysis, testing software, log analysis, event correlation, anomaly detection, and behavioral analysis. Defining cybersecurity controls for different systems and networks. Creates novel cyber security technology components to ensure that critical systems/information are resilient to cyber exploits and attacks. Performs attendant vulnerability assessments, analysis, and software engineering and design. Ensures cybersecurity needs established and maintained for operations, security requirements definition, security risk assessment, information systems analysis, information systems design, information systems hardening, configuration and maintenance of other security boundary devices (IDS/IPS, Firewalls, perimeter routing) and vulnerability scanning, incident response, disaster recovery, and operations continuity planning and provides analytical support for security policy development and analysis. Engineers, implements, and maintains Information Technology Infrastructure and associated cybersecurity controls. Areas of responsibility include but are not limited to information security operations, cyber risk & intelligence, data loss & fraud protection, regulatory compliance, policy management and audits & assessment. Key Responsibilities Helps with the validation security control configuration on systems, ensure all systems are configured to necessary controls, such as NIST, DFARS ************, CMMC, and other similar requirements. Performs day to day analysis of security threats. Performs day to day remediation of security incidents. Provide leadership to lower-level cybersecurity and IT professionals across the enterprise.
Skills
Soc, Threat hunting, Splunk, Crowd Strike, Code-42, Incident response, Analysis
Top Skills Details
Soc,Threat hunting,Splunk,Crowd Strike,Code-42
Additional Skills & Qualifications
Additional Responsibilities Assuring implementation of technical solutions supportive of institution information and Cybersecurity systems while identifying potential threatening behaviors through analysis of user compliance. Supporting information security operations, Cyber risk & intelligence, data loss and fraud protection, regulatory compliance, policy management and audits and assessment. Able to perform root cause analysis to identify and incorporate opportunities for continuous process improvement and future risk mitigation efforts, will be able to comprehend functionality of multiple technical tools and develop understanding of collection techniques and methodologies, recommend and develop requirements, specifications, design and procedures to satisfy security policy and planning and understand and author analytical reports identifying technical and behavioral analysis identified through independent reviews using multiple technology solutions. Ensures Cybersecurity needs are established and maintained for operations, security requirements, security risk assessment, information systems analysis, information systems design, information systems hardening, configuration and maintenance of other security boundary devices and vulnerability scanning, incident response, disaster recover, and operations continuity planning. Able to provide analytical support for security policy development and analysis identifying countermeasures associated with responsibilities. Engineer, implement, and maintain information technology solutions and associated Cybersecurity controls directly supporting the Insider Threat Program. Directly support the Insider Threat Program and focus on operational collection methods while performing studies through analysis and provide decision support for potential program enhancements in direct support of guidance derived from contractual requirements outlined in 32 CFR Part 117, National Industrial Security Program Operating Manual (NISPOM)
Experience Level
Expert Level
Pay and Benefits
The pay range for this position is $62.50 - $67.31/hr.
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible, the benefits available for this temporary role may include the following:
- Medical, dental & vision - Critical Illness, Accident, and Hospital - 401(k) Retirement Plan - Pre-tax and Roth post-tax contributions available - Life Insurance (Voluntary Life & AD&D for the employee and dependents) - Short and long-term disability - Health Spending Account (HSA) - Transportation benefits - Employee Assistance Program - Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type
This is a fully onsite position in Atlanta,GA.
Application Deadline
This position is anticipated to close on Jun 11, 2025.
About TEKsystems and TEKsystems Global Services
We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com.
The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Cyber Security Analyst
Cyber Security Analyst Job 15 miles from Union City
Role Value Proposition:
The Incident Response Analyst will be a member of UpTime365's Global Cyber Incident Response Team. In this role, an analyst will use cutting edge tools and solutions, and collaborate with global team members across the organization to perform cyber incident response and protect UpTime365's partners against cyber threats.
Key Responsibilities:
Response to cyber security events and incidents by analyzing forensic data, logs, and threat intel to validate security threats, assess impact, determine root cause, and help coordinate remediation actions.
Maintain awareness of emerging threats.
Willingness and self-motiviation to learn and take advantage of all training opportunities provided.
Perform proactive threat hunting to identify potential threats to UpTime365 and its partners.
Partner with global incident response teams to coordinate global incident response.
Eventual participation on a rotating on-call roster for off hour escalations.
Requirements
Essential Business Experience and Technical Skills:
A bachelor's degree in cyber security or computer science, or 2-4 years of combined IT and Cyber Security related work experience.
1-3 years of experience analyzing logs (e.g. endpoint, network, identity), performing data correlation, and using SIEM or log management tools.
Basic understanding of the Windows operating system and command line tools, network fundamentals, and cyber security concepts and frameworks.
Scripting experience for analysis and automation of repeatable processes.
Security specific certifications from SANS and other industry recognized organizations are desirable.
Benefits
Dental insurance
Medical insurance
Vision insurance
401K
Paid vacation and sick leave
Tuition fee reimbursement
Students loan assistance
Cyber Security Analyst Senior
Cyber Security Analyst Job 15 miles from Union City
Location: This role requires associates to be in-office 1 day per week, fostering collaboration and connectivity, while providing flexibility to support productivity and work-life balance. This approach combines structured office engagement with the autonomy of virtual work, promoting a dynamic and adaptable workplace. Ideal candidates will be able to report to one of our Pulse Point locations in Nashville, TN, Atlanta, GA or Indianapolis, IN.
The Cyber Security Analyst Senior is responsible for managing the delivery of information and network security systems and/or technology services, which may include server, desktop, software, network, database, helpdesk components.
How you will make an impact:
* Provides trouble resolution on complex problems and leads implementations for system and network security technologies.
* Develops testing plans to ensure quality of implementation.
* Coordinates and prepares the reporting of data security events and incidents using PowerPoint and similar tools.
* Provides system and network architecture support for information and network security technologies.
* Provides technical support to business and technology associates in risk assessments and implementation of appropriate information security procedures, standards and technologies.
* Represents major upgrades and reconfigurations in change control.
* Maintains relationships with key vendors.
* Determines and performs complex configuration changes to meet business and information security requirements.
* Represents security support in significant projects.
* Responds to level 3 and 4 change and problem requests without supervision.
* Leads level 1 and 2 incident recoveries and root cause analysis.
* Supports customer security assessments and audits.
* Works with application teams to track remediation of application vulnerabilities
* Supports HIPAA and HITRUST assessments.
* Provides guidance on Policies and Procedures and supports adherence.
Minimum Requirements:
* Requires a bachelor's degree or equivalent combination of education and experience that would provide the knowledge to perform such work. Experience must include a minimum of 3 years of experience in a support and operations or design and engineering role in any of the following areas: access management or network security technologies, servers, networks, network communications, telecommunications, operating systems, middleware, disaster recovery, collaboration technologies, hardware/software support or other infrastructure services role; or any combination of education and experience, which would provide an equivalent background.
* Requires experience providing top-tier support for 3 or more of the information security technology areas: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security.
Preferred Skills, Capabilities and Experiences:
* Technical security certifications (e.g. Systems Security Certified Practitioner) highly preferred.
* BA/BS degree in Information Systems and Computer Science or related field of study highly preferred.
* Familiarity with Microsoft tools (Excel, PowerPoint, etc.) preferred.
Please be advised that Elevance Health only accepts resumes for compensation from agencies that have a signed agreement with Elevance Health. Any unsolicited resumes, including those submitted to hiring managers, are deemed to be the property of Elevance Health.
Who We Are
Elevance Health is a health company dedicated to improving lives and communities - and making healthcare simpler. We are a Fortune 25 company with a longstanding history in the healthcare industry, looking for leaders at all levels of the organization who are passionate about making an impact on our members and the communities we serve.
How We Work
At Elevance Health, we are creating a culture that is designed to advance our strategy but will also lead to personal and professional growth for our associates. Our values and behaviors are the root of our culture. They are how we achieve our strategy, power our business outcomes and drive our shared success - for our consumers, our associates, our communities and our business.
We offer a range of market-competitive total rewards that include merit increases, paid holidays, Paid Time Off, and incentive bonus programs (unless covered by a collective bargaining agreement), medical, dental, vision, short and long term disability benefits, 401(k) +match, stock purchase plan, life insurance, wellness programs and financial education resources, to name a few.
Elevance Health operates in a Hybrid Workforce Strategy. Unless specified as primarily virtual by the hiring manager, associates are required to work at an Elevance Health location at least once per week, and potentially several times per week. Specific requirements and expectations for time onsite will be discussed as part of the hiring process.
The health of our associates and communities is a top priority for Elevance Health. We require all new candidates in certain patient/member-facing roles to become vaccinated against COVID-19 and Influenza. If you are not vaccinated, your offer will be rescinded unless you provide an acceptable explanation. Elevance Health will also follow all relevant federal, state and local laws.
Elevance Health is an Equal Employment Opportunity employer and all qualified applicants will receive consideration for employment without regard to age, citizenship status, color, creed, disability, ethnicity, genetic information, gender (including gender identity and gender expression), marital status, national origin, race, religion, sex, sexual orientation, veteran status or any other status or condition protected by applicable federal, state, or local laws. Applicants who require accommodation to participate in the job application process may contact ******************************************** for assistance.
Qualified applicants with arrest or conviction records will be considered for employment in accordance with all federal, state, and local laws, including, but not limited to, the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act.
Cyber Security Analyst Senior
Cyber Security Analyst Job 15 miles from Union City
Location: This role requires associates to be in-office 1 day per week, fostering collaboration and connectivity, while providing flexibility to support productivity and work-life balance. This approach combines structured office engagement with the autonomy of virtual work, promoting a dynamic and adaptable workplace. Ideal candidates will be able to report to one of our Pulse Point locations in Nashville, TN, Atlanta, GA or Indianapolis, IN.
The Cyber Security Analyst Senior is responsible for managing the delivery of information and network security systems and/or technology services, which may include server, desktop, software, network, database, helpdesk components.
How you will make an impact:
* Provides trouble resolution on complex problems and leads implementations for system and network security technologies.
* Develops testing plans to ensure quality of implementation.
* Coordinates and prepares the reporting of data security events and incidents using PowerPoint and similar tools.
* Provides system and network architecture support for information and network security technologies.
* Provides technical support to business and technology associates in risk assessments and implementation of appropriate information security procedures, standards and technologies.
* Represents major upgrades and reconfigurations in change control.
* Maintains relationships with key vendors.
* Determines and performs complex configuration changes to meet business and information security requirements.
* Represents security support in significant projects.
* Responds to level 3 and 4 change and problem requests without supervision.
* Leads level 1 and 2 incident recoveries and root cause analysis.
* Supports customer security assessments and audits.
* Works with application teams to track remediation of application vulnerabilities
* Supports HIPAA and HITRUST assessments.
* Provides guidance on Policies and Procedures and supports adherence.
Minimum Requirements:
* Requires a bachelor's degree or equivalent combination of education and experience that would provide the knowledge to perform such work. Experience must include a minimum of 3 years of experience in a support and operations or design and engineering role in any of the following areas: access management or network security technologies, servers, networks, network communications, telecommunications, operating systems, middleware, disaster recovery, collaboration technologies, hardware/software support or other infrastructure services role; or any combination of education and experience, which would provide an equivalent background.
* Requires experience providing top-tier support for 3 or more of the information security technology areas: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security.
Preferred Skills, Capabilities and Experiences:
* Technical security certifications (e.g. Systems Security Certified Practitioner) highly preferred.
* BA/BS degree in Information Systems and Computer Science or related field of study highly preferred.
* Familiarity with Microsoft tools (Excel, PowerPoint, etc.) preferred.
Job Level:
Non-Management Exempt
Workshift:
Job Family:
IFT > IT Security & Compliance
Please be advised that Elevance Health only accepts resumes for compensation from agencies that have a signed agreement with Elevance Health. Any unsolicited resumes, including those submitted to hiring managers, are deemed to be the property of Elevance Health.
Who We Are
Elevance Health is a health company dedicated to improving lives and communities - and making healthcare simpler. We are a Fortune 25 company with a longstanding history in the healthcare industry, looking for leaders at all levels of the organization who are passionate about making an impact on our members and the communities we serve.
How We Work
At Elevance Health, we are creating a culture that is designed to advance our strategy but will also lead to personal and professional growth for our associates. Our values and behaviors are the root of our culture. They are how we achieve our strategy, power our business outcomes and drive our shared success - for our consumers, our associates, our communities and our business.
We offer a range of market-competitive total rewards that include merit increases, paid holidays, Paid Time Off, and incentive bonus programs (unless covered by a collective bargaining agreement), medical, dental, vision, short and long term disability benefits, 401(k) +match, stock purchase plan, life insurance, wellness programs and financial education resources, to name a few.
Elevance Health operates in a Hybrid Workforce Strategy. Unless specified as primarily virtual by the hiring manager, associates are required to work at an Elevance Health location at least once per week, and potentially several times per week. Specific requirements and expectations for time onsite will be discussed as part of the hiring process.
The health of our associates and communities is a top priority for Elevance Health. We require all new candidates in certain patient/member-facing roles to become vaccinated against COVID-19 and Influenza. If you are not vaccinated, your offer will be rescinded unless you provide an acceptable explanation. Elevance Health will also follow all relevant federal, state and local laws.
Elevance Health is an Equal Employment Opportunity employer, and all qualified applicants will receive consideration for employment without regard to age, citizenship status, color, creed, disability, ethnicity, genetic information, gender (including gender identity and gender expression), marital status, national origin, race, religion, sex, sexual orientation, veteran status or any other status or condition protected by applicable federal, state, or local laws. Applicants who require accommodation to participate in the job application process may contact ******************************************** for assistance. Qualified applicants with arrest or conviction records will be considered for employment in accordance with all federal, state, and local laws, including, but not limited to, the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act.
Sr Security and Threat Monitoring Analyst
Cyber Security Analyst Job 15 miles from Union City
With 80,000 customers across 150 countries, UKG is the largest U.S.-based private software company in the world. And we're only getting started. Ready to bring your bold ideas and collaborative mindset to an organization that still has so much more to build and achieve? Read on.
At UKG, you get more than just a job. You get to work with purpose. Our team of U Krewers are on a mission to inspire every organization to become a great place to work through our award-winning HR technology built for all.
Here, we know that you're more than your work. That's why our benefits help you thrive personally and professionally, from wellness programs and tuition reimbursement to U Choose - a customizable expense reimbursement program that can be used for more than 200+ needs that best suit you and your family, from student loan repayment, to childcare, to pet insurance. Our inclusive culture, active and engaged employee resource groups, and caring leaders value every voice and support you in doing the best work of your career. If you're passionate about our purpose - people -then we can't wait to support whatever gives you purpose. We're united by purpose, inspired by you.
About the Team
As a Senior Security and Threat Monitoring Analyst, you will be part of UKG's Global Security Operations Center (GSOC) team investigating events of interest and incidents within UKG's FedRAMP authorized computing environments.
About the Role
You will facilitate and follow UKG's standard processes to investigate, contain, eradicate, and respond in a continued and unified effort to protect the confidentiality, integrity, and availability of UKG, our partners' and customers' data and services.
You will be an escalation point for all incidents, analyzing, confirming, re-prioritizing if necessary and remediating those identified threats within the UKG FedRAMP authorized computing environments. You will leverage your skills, experience, and creativity to perform initial, forensically sound collection and analysis, methodologies to contain, eradicate, and recover from realized threats such as zero-day, ransomware, malware and other APT's.
Additionally, you will be responsible for participating in incident response activities as part of the Cyber Incident Response Team (CIRT) or as the Cyber Incident Response Lead (CIRL), providing strong technical and environmental knowledge during the incident. You will lead efforts, post incident, in reporting and continuous improvement recommendations to enhance UKG's security posture through process development, tool rationalization, detection technique and automation enhancement opportunities and enablement/training possibilities.
Due to the nature of the work, you are required to have occasional on-call duties on weekends and/or holidays. Additional work hours may also be required during an incident investigation.
Responsibilities:
* Review tickets escalated from junior analysts to confirm the priority, category and accuracy of the details and conditions.
* Pivot to additional security tools to obtain and ascertain context or information and any other pertinent information to inform on the most effective and efficient mitigation/remediation actions.
* Escalate tickets as required to GSOC Director for additional scrutiny and incident declaration.
* Collaborate with UKG internal and external groups to develop and execute containment, eradication, and recovery strategies for lower priority incidents.
* Identify, approve, and implement blocking, listing and other mechanisms to promote a robust security posture.
* Participate in the Cyber Incident Response Plan (CIRP) process as part of the Cyber Incident Response Team (CIRT) or as the Cyber Incident Response Lead (CIRL) to lead and/or support mitigating and/or remediating critical incidents.
* Participate in post-incident activities including coordinating and providing input within the requisite reports and identifying areas for continuous improvements within the GSOC enablement, processes or technology.
* Provide mentoring and enablement of junior analysts globally to expand and extend UKG's GSOC capabilities and experiential capacities.
Basic Qualifications:
* Working professional with 4-6 years of relevant Security/SOC experience
* 4-6 years of experience with common attack vectors on the network layer, different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
* 4-6 years of experience with cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored) and cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
* Working knowledge of FedRAMP requirements, processes and procedures
* Bachelor's degree in computer science or a related discipline
* CISSP, CCSP, GIAC or other relevant cyber security certifications
Preferred Qualifications:
* Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
* Knowledge of cybersecurity, incident response methodologies, privacy principles, cyber threats, vulnerabilities, and detection methodologies and techniques for detecting intrusions.
* Experience with Splunk, ServiceNow SIR, EDR solutions, email security tools, and cloud environments (GCP, Azure).
* Knowledge and experience in reverse engineering to understand how an information asset works and analyzing system components to identify potential vulnerabilities.
* Knowledge and experience in developing automations using scripting languages like Python and PowerShell to automate various tasks and improve accuracy, enhance task consistency, and increase scalability.
* Knowledge and experience in conducting and participating in security audits and assessments.
* Understanding and experience in developing and delivering relevant and value-add operational metrics to support and provide visibility into the GSOC program.
* Knowledge of new and emerging cybersecurity technologies, threats, and threat vectors.
* Knowledge and experience in designing, executing, and reporting threat hunting activities.
* Knowledge and experience around offensive security (ethical hacking) techniques to identify and mitigate/remediate vulnerabilities in the UKG environment.
* Knowledge and experience in cyber forensic procedures and how to extract information and generate reports in support of incident response and other advanced requirements.
Where we're going
UKG is on the cusp of something truly special. Worldwide, we already hold the #1 market share position for workforce management and the #2 position for human capital management. Tens of millions of frontline workers start and end their days with our software, with billions of shifts managed annually through UKG solutions today. Yet it's our AI-powered product portfolio designed to support customers of all sizes, industries, and geographies that will propel us into an even brighter tomorrow!
Equal Opportunity Employer
UKG is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, disability, religion, sex, age, national origin, veteran status, genetic information, and other legally protected categories.
View The EEO Know Your Rights poster
UKG participates in E-Verify. View the E-Verify posters here.
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
The pay range for this position is $99,800.00 to $143,450.00 USD, however, base pay offered may vary depending on skills, experience, job-related knowledge and location. This position is also eligible for a short-term incentive and a long-term incentive as part of total compensation. Information about UKG's comprehensive benefits can be reviewed on our careers site at ***************************
Information Security Specialist - VSRP
Cyber Security Analyst Job 15 miles from Union City
Every day, Global Payments makes it possible for millions of people to move money between buyers and sellers using our payments solutions for credit, debit, prepaid and merchant services. Our worldwide team helps over 3 million companies, more than 1,300 financial institutions and over 600 million cardholders grow with confidence and achieve amazing results. We are driven by our passion for success and we are proud to deliver best-in-class payment technology and software solutions. Join our dynamic team and make your mark on the payments technology landscape of tomorrow.
Summary of This Role
Ensures the security posture of Global Payments through the security assessment, risk ranking, and continuous monitoring of critical vendor relationships. In this role you will help define efficient vendor assessment processes, identify and nurture partnerships both internal and external, and help coordinate vendor assessment activities. You will work closely with the Vendor Management Program Office (VMPO), Legal, Compliance, and Operations to provide cybersecurity expertise at vendor onboarding and throughout the vendor lifecycle.
What Part Will You Play?
Serves as a subject matter expert for the assessment of vendors and recommendations for risk treatment of identified gaps.
Performs vendor security assessments.
Coaches team members on the vendor assessment process and helps guide them through challenges as needed.
Maintains and authors process documentation as required for existing processes or to define new processes to be implemented.
Engages in special projects as required to deliver writeups, reports, or assessment summaries.
Keeps up-to-date knowledge of new and emerging threats that can affect the organization's information assets by analyzing third party vendors and their respective infrastructure, policies, and best practices.
Coordinate with relevant departments to help ensure the information in the Third-party Risk Management (TPRM) tool remains current and up to date.
Respond to and process Threat intel alerts received from the TPRM tool through to resolution.
Manages communication from the Vendor Security Risk Program (VSRP) to our internal partners in the event of a vendor incident.
Assesses risks based on changes to implementation of NIST (National Institute of Standards and Technology, ISO (International Organization for Standardization)/BSO (Business Services Online); enhances knowledge of PCI (Payment Card Industry)/Logical Security guidelines and models, HIPPA (Health Insurance Portability and Accountability Act), PII (Personally Identifiable Information) , and Card personalization.
Enhances understanding of business objectives and helps provide direction based on risk, Corporate Security Policy, and association and regulatory guidelines.
Other duties as assigned.
What Are We Looking For in This Role?
Minimum Qualifications
Bachelor's Degree
Relevant Experience or Degree in: Bachelor's degree in Computer Science, Info Security, or related field
Minimum 6 Years Relevant Experience
A proven track record of success assessing and monitoring the security posture of vendors.
Including network operations or engineering or system administration on Unix, Linux, MAC(Message Authentication Code), or Windows; proven experience working with security operations, intrusion detection systems, Security Incident Even Management systems, and anti-virus collection logs; including knowledge of industry standard security compliance programs ((PCI(Payment Card Industry), SOX(Sarbanes-Oxley) , GLBA(Gramm Leach Bliley Act)), etc.). Knowledge of industry standard security compliance programs ((PCI(Payment Card Industry), SOX(Sarbanes-Oxley) , GLBA(Gramm Leach Bliley Act), etc.)
Preferred Qualifications
Professional certifications CISSP (Certified Information System Security Professional), CISM (Certified Information Security Manager) , CISA (Certified-Information-Systems-Auditor), GSEC (GIAC Security Essentials , Network +, Security +
What Are Our Desired Skills and Capabilities?
Soft Skills/Intrapersonal Skills - Exceptional verbal and written communication skills.
Ability to positively influence to effect change within the organization.
Ability to work within a team of exceptionally skilled individual contributors.
Skills / Knowledge - Having wide-ranging experience, uses professional concepts and company objectives to resolve complex issues in creative and effective ways.
Job Complexity - Works on complex issues where analysis of situations or data requires an in-depth evaluation of variable factors. Exercises judgment in selecting methods, techniques and evaluation criteria for obtaining results. Networks with key contacts outside their own area of expertise.
Supervision - Determines methods and procedures on new assignments and may coordinate activities of other personnel (Team Lead).
Risk Assessment - Ability to identify, communicate, and mitigate vendor security risk.
Industry Knowledge - Continued self-education of new and emerging threats and relevant processes, controls, or technologies to mitigate them.
Incident Response - Knowledge and skills to contribute to all phases of Incident Response.
Global Payments Inc. is an equal opportunity employer. Global Payments provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex (including pregnancy), national origin, ancestry, age, marital status, sexual orientation, gender identity or expression, disability, veteran status, genetic information or any other basis protected by law. If you wish to request reasonable accommodations related to applying for employment or provide feedback about the accessibility of this website, please contact ******************.
Customer Assurance Analyst
Cyber Security Analyst Job 31 miles from Union City
Join the Team Making Possibilities Happen
If you've ever used an ATM, paid a bill through your phone, sent money to a friend or shopped online, chances are your transaction was safeguarded and processed using our software. Now it's your turn to serve the payment needs of organizations and people the world over.
This position can be remote but candidates must live and work in the US in Eastern and Central Time Zone only.
Job Purpose
Serve as Liaison to facilitate ACI's response to external audit/exam/assessment engagements to provide external assurance of ACI's management, operational, and control alignment with applicable regulations, IT security standards, contract requirements, etc. as related to Information Security and Risk Management policies, procedures, and relevant control implementations.
Scope of engagements will include but is not limited to global Regulations of Financial Services/Banking and Healthcare sectors, Industry Standards such as ISO (27001, 27017), PCI (DSS, PIN, 3DS), SSAE18 (SOC1/SOC2), and industry best practice related to Information Security, Risk Management, Business Continuity/Disaster Recovery, Privacy, and more. Source of external engagements include but is not limited to Regulators, Customers, Business Partners, and more.
Essential Functions and Responsibilities
Work collaboratively externally, and internally with many teams across functional areas and geographies to ensure engagements are facilitated professionally and timely. Provide audit/exam/assessment subject matter expertise to ensure engagement achieves its stated goal in a timely manner.
Work proactively to reduce impact of engagement and limit duplication of control analysis and testing, by leveraging readily available assurance package of information and relevant reports available for distribution to auditors/examiners. Work closely with team members to identify similar requests and leverage shared knowledge and experience to efficiently facilitate each engagement.
Facilitate the completion of all required tasks during the engagement, including but not limited to answering due-diligence questionnaires, providing policy/procedure documentation and control evidence to auditor/examiner, coordinating meetings with relevant SMEs, hosting web-sessions, documenting meeting minutes and audit/exam notes, and more.
Utilize all necessary tools to ensure all relevant documentation is gathered and stored during and post engagement.
Communicate engagement requests and notices with urgency to management and key stakeholders, escalate engagement risks effectively and drive to resolution in timely manner to ensure minimal impact to engagement.
Understand and adhere to all Corporate Policies, including but not limited to ACI Code of Business Conduct and Ethics, and Global Information Security Standards
Understand and adhere to all department procedures for facilitation of engagements, tracking and reporting of engagement findings, and escalation procedures as needed.
Communicate effectively and professionally in all aspects of the role, internally and externally, representing ACI's Core Values and promoting a positive environment for ACI to maintain and build trust within the context of external engagements.
Effectively utilize, and support development and maintenance, of team processes and procedure documentation, tools for tracking and reporting engagements, their status and progress, and any outcome requiring further monitoring and reporting.
Contribute to ongoing maturity and development of team to achieve goals outlined by management.
Maintain professional and technical knowledge by attending educational workshops; reviewing professional publications; establishing personal networks; benchmarking state-of-the-art practices; participating in professional societies.
Other duties as assigned.
Qualifications (Education, Experience, Knowledge, Skills, and Abilities)
Bachelor's degree or equivalent experience, preferably in Information Systems related field of study, Information Security Risk Management/Third Party Risk Management, or Compliance, Certification Requirements: CISM, CRISC, CISA, CISSP, or CTPRP required.
3+ years' experience in related fields, such as Information Security, Risk Management/Third Party Risk Management, Compliance
Certification Requirements: CTPRP or equivalent certification required.
Preferred Qualifications (Education, Experience, Competencies)
Certification: CISM, CRISC, CISA, CISSP, or CTPRP required.
Prior experience in Payments Services industry
Benefits: In return for your expertise, we offer growth, opportunity, and a competitive compensation and benefits package in a casual work environment.
Are you ready to help us transform the world of electronic payments? To learn more about ACI Worldwide, visit our web site at ******************** Job ID (Requisition #16097)
ACI Worldwide is an AA/EEO employer in the United States, which includes providing equal opportunity for protected veterans and individuals with disabilities, and an EEO employer globally
#LI-LF1
#LI-Hybrid
Information Security Analyst
Cyber Security Analyst Job 15 miles from Union City
360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement.
Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and JQuery mobile.
Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one's business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel's through us.
We make sure that we deliver performance driven products that are optimally developed as per your organization's needs. Take a shot at us for your IT requirements and experience a radical change.
Job Description
The candidate will be a member of the Application Security Assessment (ASA) Team enforcing Global Cyber Security & Fraud at First Data. This includes automated vulnerability scanning mixed with manual penetration testing against web-based applications, web services, and thick client applications.
Job Specific Responsibilities Utilize dynamic and static application security testing tools effectively, including IBM AppScan Standard, Fortify SCA, Burp Suite Pro, and Qualys.
Host developer-focused appsec training workshops on topics including secure coding and vulnerability remediation.
Coordinate testing objectives, reporting deliverables, and remediation efforts as the liaison between the financial institution(s), First Data, and third-party assessors.
Provide documented guidance to development teams that define effective remediation solutions for vulnerabilities.
Contribute to maintaining First Data Corporation's PCI-DSS certifications through addressing regulatory requirements.
Availability to work occasional off-hours to complete assessments tied to meeting critical business objectives.
Interview Required: Yes
Information Technology-Info Security Analyst - Information Technology-Info Security Analyst
Qualifications
Bachelors Degree in Information Security, Computer Science, I.T., I.S., Engineering, Analytics or equivalent.
Hands on technical experience with dynamic and static security testing tools, including source code assessments.
Deep analytical skills, strong out-of-the-box thinking.
Ability to effectively perform detailed-oriented technical information security work on a full-time basis.
Excel independently in a fast-paced environment.
Effective oral and written communication skills.
Preferred Qualifications Masters Degree in Information Security, Computer Science, I.T., I.S., Engineering, Analytics or equivalent.
Proficient web-application developer with demonstrable knowledge of HTML, C/C++, Java, VB, Ruby, etc.
CEH, Security+, GWAPT
Additional Information
Regards,
Vikas Kumar
vikas.kumar(@)360itpro.com
Senior Security Analyst (Hybrid - Kennesaw, GA)
Cyber Security Analyst Job 31 miles from Union City
Headquartered in suburban Atlanta, Georgia, Artivion, Inc. is a medical device company focused on developing simple, elegant solutions that address cardiac and vascular surgeons' most difficult challenges in treating patients with aortic diseases. Artivion has over 1,400 employees worldwide with sales representation in over 100 countries. The Company has manufacturing facilities located in Atlanta, Georgia, Austin, Texas and Hechingen, Germany. Additionally, it has sales and distribution offices in various countries throughout Europe, Asia, and South America. For additional information about Artivion, visit our website, *****************
Position Overview:
The objective of the Senior Security Analyst position is to lead the design, implementation, and continuous improvement of enterprise security controls that protect the organization's digital assets, systems, and data. Reporting to the Cybersecurity Team Lead, the role is responsible for proactively identifying threats, mitigating risks, and ensuring the organization's cybersecurity posture aligns with business objectives and regulatory requirements. The Senior Security Engineer acts as a technical expert and key contributor to the development of a resilient, scalable, and secure IT environment while mentoring junior team members and collaborating with cross-functional teams.
Responsibilities:
* Proactively identify and analyze unauthorized activity (e.g., misuse, malware, intrusion attempts, phishing) on the global network and provide incident documentation.
* Perform analysis of security alerts to evaluate true positive malicious risk to the business, determine containment action, and identify required preventative measures.
* Perform regular vulnerability scans on network devices & web applications, provide technical & executive reports and assist with the remediation process.
* Monitor identity and access management, including monitoring for abuse of permissions by authorized system users.
* Assist in the completion of due diligence information security audits from third parties and clients.
* Conduct regular vulnerability assessments and penetration tests.
* Collaborate with IT and DevOps teams to remediate identified vulnerabilities.
* Support audits and assessments related to frameworks such as ISO 27001, NIST, PCI DSS, or SOX.
* Ensure security controls align with business objectives, regulatory requirements, and risk management practices.
* Contribute to projects that enhance the security posture of the enterprise.
* Operationalize actionable Threat Intelligence reports from internal and external sources.
* Remain knowledgeable of changes in security technology, industry practices, and state & federal regulatory requirements and serve as an Information Security Subject Matter Expert (SME).
* Provide technical assistance to IT staff in the detection and resolution of security incidents.
* Manage end-user communication related to security awareness and manage security awareness platform.
* Develop and maintain reports and dashboards for reporting on KPIs on security awareness, threats, and events.
* Promote activities to foster information security awareness throughout the organization.
* Creates and maintains security specific documentation.
* Provides additional IT infrastructure support and project assistance as required
Qualifications:
* Minimum 5-7 years of experience in the field of Cybersecurity
* Security Operations Center (SOC) work experience with a Bachelor's degree in computer science, information systems, or related technical discipline.
* CompTIA Security+, CEH, CISSP, SSCP, CCSP or equivalent certification required.
* Excellent IT skills, including knowledge of computer networks, operating systems, software, and hardware.
* Web and email security systems experience required.
* Nessus & Tenable.io or equivalent vulnerability management system experience required.
* Anti-virus, Endpoint Detection and Response experience required.
* Broad knowledge of technical security controls required.
* Good oral and written communication skills.
* Can effectively translate and accurately communicate security and risk implications at the most senior levels across technical and non-technical stakeholders.
* This is a hybrid position that will report to our corporate headquarters in Kennesaw, GA
Information Security Analyst - IV
Cyber Security Analyst Job 37 miles from Union City
America Networks is a leading sensor and networking solutions partner for companies in any Industrial, Manufacturing, and Waste management space. We design and manufacture sensors for storage tanks, water metering, energy metering, gas monitoring, and asset management.
Our founders are hardcore telecommunications engineers with combined 200 + years of experience in designing, optimizing and performance engineering; for several mid - large wireless carriers internationally - that saw a need to provide low power, cost efficient sensors to collect data, create alerts, and predict needed actions. We have combined these sensors with low power, wide area (LPWA) networking technologies to provide clients various options to decrease re-occurring costs associated with operating an IoT network of sensors and connected devices.
We specialize in design, deployment, optimization, and support of these Networks. Whether an off-the-shelf or custom solution is needed, we'll create a solution and push the data on the best cloud platform to fit your needs, including your own.
Job Description
The responsibility of this position includes data protection, logging and monitoring for data security of our Big Data and Enterprise Data Warehouse platforms. Tools will be used to classify column level data according to confidentiality categories. This position will also be responsible for development and deployment of advanced data science algorithms to automatically detect and alert data usage anomalies. Encryption, tokenization, data masking, etc. will be applied to data according to confidentiality levels.
• B.S. or equivalent work experience
• 6+ years in related discipline
• Experience with all phases of the Software Development Lifecycle, including system analysis, design, coding, testing, debugging and documentation
• Teamwork & collaboration skills to work across organizations and lead cross-functional teams
• Communication & stakeholder management skills
• Problem solving skills to develop quick yet sound solutions to resolve complex issues
• Programming Language(s): KSH, JAVA
• Software: SHA 256, MD5, SSH, SSL, TLS, Teradata Tools and Utilities (BTEQ, MLoad, FastExport, FastLoad, TPT, TDCH, Query Grid, etc.), Hortonworks Hadoop software (Sqoop, HIVE, HBASE, SPARK, KAFKA, Kyvos, Ranger, Knox, Kerebos, etc.), Informatica software (Secure@Source, TDM, DDM, PowerCenter, BDM, EIC, IDL, IDQ, IIS, etc.), Aster, Tableau, Cognos, Qlik and other BI tools.. AWS cloud security for Hadoop/Teradata and HPE Voltage.
Demonstrated excellent teamwork and also ability to work independently with minimal supervision.
Expert knowledge of the wireless industry and data management activities.
Must have Hadoop and cloud security expertise with usage logging, monitoring, tokenization/encryption, access controls, and analysis.
Additional Information
Vivek Salvatore
vivek.salvatore(@)americanetworks.com
(
*************
Information Security Analyst - Threat Intelligence
Cyber Security Analyst Job 37 miles from Union City
Are you passionate about the changing threat landscape, love the challenge of understanding how the latest malware works, and can evangelize the risks and issues across a broad organization? Are you looking for a challenging leadership position that will allow you to shape the future of security across the internet? Do you thrive on working with a close-knit, highly-motivated team?
Come join Lancope's threat intelligence team to help protect Lancope's customers against cyber-attacks. The successful candidate will join a global team of senior security analysts focusing on the changing threat landscape and effect on Lancope's customers. This position requires a professional with a strong security software and threat analysis background that is capable of identifying and establishing the relationships and processes within and external to Lancope to build an investigative threat research structure and flow. The team will source data across Lancope, i.e. internal product and traffic monitoring groups, as well as through external partner and qualified third-party relationships.
Lancope is looking for a full time Information Security Analyst for Lancope's Threat Intelligence Team. Analysts in this role will have experience in threat research and a desire to own innovative ideas from invention, through proof-of-concept, and to deployment.
Primary Responsibilities
* Conduct literature reviews and keep abreast of state of the hack, data sources, data analysis techniques and big data
* Invent and/or apply new techniques to telemetry data on a global scale and identify new security threats
* Develop and document proofs-of-concept (POCs) to demonstrate the efficacy, performance, and scalability of new techniques
* Publish and present research findings, including methodology and measured efficacy improvements
* Help guide the development by working with product teams
* Partner to turn successful POCs into product features and actionable intelligence.
Education and Experience
The ideal candidate for this role brings considerable experience, motivation, and organization along with both intense curiosity and desire to make an impact in internet security. Researchers in this role enjoy considerable latitude and work hands-on to complete all phases of applied research. The successful applicant will have demonstrable skills in some of the below areas:
* At least 2 years relevant experience
* Network administration, System administration (Windows or Unix)
* IT security with a focus on computer forensics, incident response, malicious code/exploits, anti-virus, etc.
* Knowledge of the current security threat landscape, especially network and web-based threats
* Familiar with Windows exploits, malware and malicious code trends
* Knowledge of TCP/IP and application in securing systems, investigating security incidents
* Solid understanding of computer science fundamentals, software engineering
* Knowledge of one or more programming/scripting languages
* Web application and script development
* Log and data analysis
* Strong written and verbal communication
* Self-motivated and highly ambitious
* Creative problem solving skills and excellent troubleshooting/debugging skills
* Excellent teamwork and people skills
* Ability to manage multiple tasks and work towards long-term goals
* Incident response experience a definitive plus
Information Security Analyst
Cyber Security Analyst Job 15 miles from Union City
Directly accountable for safeguarding the organization's information assets. The role involves designing, implementing, and enforcing security protocols and procedures that mitigate risks and ensure compliance. With heavy focus in information security operations, including vulnerability management, incident/event management, compliance management, policy/procedure development and information security awareness.
This responsibility will be carried out through the development of information security requirements, planning, design, implementation, and periodic audit/validation of effectiveness of all security controls.
Accountabilities:
+ Determine information security requirements by evaluating and researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; and identifying integration issues.
+ Design, and implement security controls for our infrastructure and critical systems.
+ Verify information security systems effectiveness by developing and implementing testing and validation processes to periodically audit systems.
+ Collaborate with managed security service provider (MSSP) to ensure their services are effectively delivered to our organization and validate that alerts are properly acted upon to mitigate identified threats.
+ Support security incident response activities utilizing security tools (SIEM/SOAR)
+ Collaborate in the development of a Business Continuity and Disaster Recovery plan.
+ Prepare system security reports by collecting, analyzing, and summarizing data and trends.
+ Track and understand emerging security practices and threats. Leverage this knowledge to improve security configurations across the enterprise and hunt for potential or active threats.
+ This role will be responsible for monitoring Healthcare industry and regulatory trends to ensure prompt and complete action plans are developed and implemented to address such requirements.
+ Serve as the liaison for audit activities related to the areas of information security.
+ This will also include maintaining ongoing cybersecurity risk profile using the recommended industry tools, and being certain that activities which keep us aligned with our target levels are implemented.
+ Demonstrable expertise in implementing, managing, and fine-tuning security controls using a variety of security tools and frameworks. Specific experience with Palo Alto firewalls and Palo Alto suite of security tools, Fortinet Fortigate Firewalls, Meraki, Active Directory and other infrastructure tools as identified.
+ In-depth experience with Identity and Access Management (IAM), specifically in designing and implementing IAM solutions for provisioning, de-provisioning, and role-based access controls within the organization. Familiarity with industry standard IAM solutions and best practices is a must.
+ Familiarity with monitoring and managing security incidents, including the use of Security Information and Event Management (SIEM) tools.
+ Proven track record in working with cross-functional teams to address security and compliance challenges, specifically in a Healthcare environment.
+ Experience in developing and implementing security policies and procedures that align with industry regulations such as PCI and HIPPA.
+ Previous involvement in handling external and internal audits related to information security, along with remediation of identified issues.
+ A high level of problem-solving skills and the ability to communicate in a clear, concise manner.
+ Must be able to communicate effectively in both oral and written form and explain technical concepts in non-technical terms to staff and prepare clear and concise written communications.
+ Must be able to manage multiple projects/tasks concurrently; and prioritize requests and complete assignments within an estimated timeframe; and organize, schedule, and coordinate a variety of activities and projects.
+ Must have the ability to learn new software and hardware packages and adapt to changes in technology.
Qualifications:
+ Bachelor's Degree in computer science or Equivalent work experience
+ At least 5 years of experience in information security preferred
+ Excellent written communication skills.
+ Strong organizational and planning skills.
+ Demonstrates a high degree of personal integrity and practices ethical standards. Must remain objective and independent when completing assignments, and consistently demonstrate the ability to hold information in confidence.
+ Demonstrated proactiveness and an ability to work independently and self-directed in managing multiple concurrent projects.
+ Excellent analytical and problem-solving skills.
**Anticipated salary range:** $79,700 - $119,490
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 5/28/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security Associate or Specialist
Cyber Security Analyst Job 37 miles from Union City
The use of IT (Information Technology) infrastructure in the company is vital for daily operation. The IS (Information Security) Specialist should Provide secure Information Technology infrastructure service to the company as well as companywide employees and staff.
Role Description.
Define and implement Macro (Servers, Groups and Shared resource) and Micro (Personal and Single) IT infrastructure. Analyze, Plan, Design, Develop and Implement IT Infrastructure and IT Security solutions to support company IT requirements. Analyze and prevent any Information risk ensuring the companys information integrity. Define, maintain and monitor the execution of IS and IT policies. Execute and monitor company IT/IS Compliance.
Essential Duties and Responsibilities
-Monitoring and maintaining computer systems and networks
-Responding in a timely manner to service issues and requests
-Providing technical support across the company
-Support equipment repair and replacement service
-Testing Benchmarking new technology
-Maintain and execute IT Training program for new employs
-Monitor IT/IS Infrastructure (including servers and network devices) to ensure data integrity
-Reporting of daily system issues.
-Analyze and propose system improvements.
-Documentation related to IT/IS policies, issues, and procedures.
-Participation and active analyst, designer, and developer in IT projects.
-Monitoring of IT/IS infrastructure-related expenses.
-Other duties as assigned.
Requirements
Qualifications: Listed below are the minimum and/or desired qualifications of the position including education, work experience, and knowledge & skills that are required to perform satisfactorily in the position:
Education and Work Experience:
-Vocational or undergraduate degree in information systems and computer science or related field.
-One (1) to three (3) years of information systems, computer science and/or IT-related experience.
Knowledge and Skills:
-PC and Server management
-IT Hardware and Software installation
-Initiative skills
-Problem-solving skills
-Understanding of IT infrastructure and application architectures
-Great Social and Communication Skills
-Great Oral and Written Communication Skills
-System process analysis and design capabilities/experience
-Server Operating systems (Windows Server, Linux, HP-UX, Unix, Sun Solaris)
-Antivirus, NAC, DLP, MDM and other IS Solutions
-IS Related definition and policies (ex. ISO 27001)
-Networking (Cisco/HP) and network devices (Routers and Switch)
-VPN
-TCP/IP, UDP, Network standards
-LDAP, Active Directory and Exchange
-Access Control
-Security Cameras
-Firewall, Web Filter and other network security appliance solutions
-Database systems (SQL Server/MySQL/Oracle) and programming skill (is a plus)
-MS Office skills (especially Excel skills)
Physical Demands:
-Position requires sitting at a desk working on a computer for at least 2/3 of time.
-Position requires regular and reliable attendance.
-Position requires local travel up to 10% of the time.
Information Security Analyst
Cyber Security Analyst Job 31 miles from Union City
Were seeking a technically proficient and personable security and compliance professional to lead risk management efforts and ensure adherence to SOC 2 and regulatory standards (FTC Safeguards, CCPA, NYCRR). This role requires strong communication skills to interface with employees across the organizationexplaining security needs clearly and courteously while maintaining firm, professional boundaries. Youll manage hundreds of systems, monitor controls, conduct audits and risk assessments, develop policies and training, and stay current on evolving security laws and threats. This role can pay anywhere from 30-33 hourly depending on relevant experience level.
We are a company committed to creating inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity employer that believes everyone matters. Qualified candidates will receive consideration for employment opportunities without regard to race, religion, sex, age, marital status, national origin, sexual orientation, citizenship status, disability, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to Human Resources Request Form (****************************************** Og4IQS1J6dRiMo) . The EEOC "Know Your Rights" Poster is available here (*********************************************************************************************** .
To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: *************************************************** .
Skills and Requirements
Bachelors Degree in Information Security, or a similar discipline.
Must have 5+ years of experience in cybersecurity SOC.
Current CISSP certification (preferred to have CISSP over a Security degree)
Must have personable skillsets to interact with end-users.
Proven experience with security technologies such as SIEM, endpoint protection, and vulnerability management tools (Experienced with Rapid 7 and SentinelOne technology platforms.)
Strong knowledge of network protocols, security architecture, encryption techniques, and secure application development.
Process regarding steps, hands-on experience with incident response, threat hunting, and penetration testing.
Excellent communication skills, both written and verbal, with the ability to explain complex security issues to non-technical stakeholders.
Knowledge of emerging cybersecurity threats, trends, and attack vectors.
Strong analytical and problem-solving skills, with the ability to take ownership and accountability, and think critically in high-pressure situations. Experience with scripting languages (Python, PowerShell, etc.) for automation and security tool integration. null
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal employment opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment without regard to race, color, ethnicity, religion,sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military oruniformed service member status, or any other status or characteristic protected by applicable laws, regulations, andordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request to ********************.
Information Security Governance Support Analyst
Cyber Security Analyst Job 15 miles from Union City
THE FIRM
As a leading international law firm, we are dedicated to excellence through impactful communication, collaboration, and community involvement. Our company culture has earned us one of the "100 Best Companies to Work For" for 26 consecutive years. This honor, along with many others, highlights our commitment to innovation and professional development. At Alston & Bird LLP, our foundation is made of trust, reliability, and compassion.
JOB DESCRIPTION
Are you passionate about shaping the future of cybersecurity from a strategic lens? As part of our Information Security Governance team, you'll help steer the ship-not just keep it afloat. Under the guidance of experienced leaders, you'll dive into a variety of impactful initiatives that strengthen our firm's security posture.
Your mission?
Evaluate and manage third-party vendor risks with a sharp eye for detail.
Lead the charge on client security assessments and ensure smooth, transparent communication.
Track and support remediation efforts that keep our risk profile in check.
Continuously monitor vendor performance and compliance.
Expand and evolve our governance program to meet tomorrow's challenges.
Design and deliver engaging security awareness education that sticks.
This role is all about driving the firm's Information Security Governance, Risk, and Compliance (GRC) program forward-with purpose, creativity, and a touch of fun. Are you ready to take on the challenge and help us stay ahead of the curve? Apply now and make a difference!
ESSENTIAL DUTIES
1. Third-Party Risk Management:
Conduct comprehensive risk assessments of vendors, focusing on security measures and compliance with information security/cybersecurity frameworks.
Evaluate vendors' IT and information security systems to identify potential risks and vulnerabilities.
Develop and implement vendor risk management policies and procedures.
Collaborate with procurement and legal teams to ensure vendor contracts include necessary risk mitigation clauses.
Monitor vendors' performance and compliance with contractual obligations.
Prepare reports, summaries, and metrics on third-party security assessments to stakeholders.
Analyze and interpret third-party security assessment findings and provide recommendations and remediation plans to mitigate identified risks.
Monitor and track third-party risk issues, ensuring timely resolution and appropriate risk mitigation actions.
2. Client Security Assessments:
Coordinate responses to client security inquiries.
Prepare thorough responses based on details of our technical and policy environment.
Collect and/or prepare evidence as necessary.
Communicate progress to team members and clients.
3. Governance Program Support:
Manage and monitor configurations related to Firm policies, client-specific policies, and/or product-specific policies.
Identify and recommend enforcement capabilities.
Coordinate establishment of necessary controls.
Manage exceptions and exclusions.
Support governance initiatives and special projects of other teams as required.
Maintain current knowledge of industry-recognized risks, possible security vulnerabilities, and current security solutions.
Remain aware of industry standards, compliance, regulation requirements, and best practices.
Recommend and/or support certification efforts.
Identify, develop, and document policies and procedures.
4. Security Awareness and Education:
Assist in the development and delivery of security awareness training.
Support the firm's secured File Transfer Protocol (FTP) system.
Monitor software installations to ensure compliance with firm policy.
SKILLS, EXPERIENCE, AND INTERESTS
Governance and Compliance:
Thorough understanding of governance concepts, approaches, controls, and frameworks (ISO27000, NIST CSF, SOC 1 and SOC 2 Type I and II, etc.).
Familiarity with relevant laws and regulation requirements (HIPAA, state privacy laws, EU privacy, GDPR, etc.).
Experience in compliance, risk assessments, investigations, or other forensic reviews.
Technical Skills:
Strong understanding of IT systems and information security practices, including enterprise IT infrastructure and architecture, operating systems, servers, web applications, endpoint and network security, identity and access management, security protocols, cloud security, cryptography, secure coding, SSDLC, penetration testing, vulnerability management, patch management, SIEM, etc.
Solid understanding of cloud vendors and the varying responsibilities between IaaS, PaaS, SaaS, etc.
Analytical and Communication Skills:
Very strong professional verbal and written communication skills, explaining technical information to clients, vendors, senior management, and staff (both technical and non-technical).
Ability to identify and evaluate vendor risks.
Ability to analyze complex data to make risk-related decisions.
Project Management and Organizational Skills:
Ability to multitask and switch focus among multiple different efforts quickly.
Excellent organizational and self-management skills.
Strong project management skills and experience.
EDUCATION AND EXPERIENCE
Required
Prior risk, compliance or governance experience
Up to 2+ years of experience in governance, risk or compliance
Prior third-party risk management experience
Preferred
Bachelor's degree in information security governance, risk, compliance, or IT-related majors
Applicable certification (CISA, Security+, CISSP, CGEIT, etc.)
Prior technical experience
Experience in heavily regulated industries
EQUAL OPPORTUNITY EMPLOYER
Alston & Bird LLP is an Equal Opportunity Employer does not discriminate on the bases of any status protected under federal, state, or local law. Applicants will be considered regardless of their sex, race, age, religion, color, national origin, ancestry, physical disability, mental disability, medical condition (associated with cancer, a history of cancer, or genetic characteristics), HIV/AIDS status, genetic information, marital status, sexual orientation, gender, gender identity, gender expression, military and veteran status, or other protected category under the law on the basis of race, color, religion, sex, age, sexual orientation, gender identity and/or expression, national origin, veteran status or disability in relation to our recruiting, hiring, and promoting practices.
The statements contained in this position description are not necessarily all-inclusive, additional duties and responsibilities may be assigned, and requirements may vary from time to time.
Professional business references and a background screening will be required for all final applicants selected for a position.
If you need assistance or an accommodation due to a disability you may contact **************************.
Alston & Bird is not currently accepting resumes from agencies for this position. If you are a recruiter, search firm, or employment agency, you will not be compensated in any way for your referral of a candidate even if Alston & Bird hires the candidate.
Information Security Specialist
Cyber Security Analyst Job 39 miles from Union City
Cyber Operations Specialist
Embark on a cutting-edge journey by joining our world-leading team as a Cyber Operations Specialist. Your prowess in cybersecurity will take center stage in safeguarding vital information and ensuring the security of our nation. Become a key player in fortifying our digital assets and upholding the confidentiality of sensitive information. In this role, you will be at the forefront of detecting and preventing cyber threats, implementing advanced security measures, and collaborating with a highly skilled team across diverse systems to ensure the organization achieves its mission with unparalleled technological prowess.
Requirements:
Attend a 55-week paid training program to gain skills and certifications in computer systems, network security, network traffic analysis, digital forensics, network security devices, communication network operations, and cyber operations.
Advanced certifications require additional full funded training programs.
Benefits:
Comprehensive Healthcare, Vision, and Dental plans.
30 days paid vacation.
90 days paid paternity and maternity vacation.
Comprehensive wellness programs including fitness facility access, nutrition consulting, curated fitness plans, and more.
Housing, clothing, and relocation allowance.
Tuition assistance.
Student loan repayment.
Flexible retirement and pension plans.
Pay and Promotion:
Entry pay and promotions vary based on education level and qualifications.
Hiring bonus opportunities available.
Specialty bonuses available depending on qualifications and position.
Guaranteed promotion opportunities.
Additional Career Opportunities:
Upon successful completion of first term contract, you are guaranteed up to 5 interviews with your choice 1,200 industry leading organizations including Charter Communications, Tesla, and Raytheon.
Similar Career Fields Include: Information Security Analyst, Network and Systems Administrator, and Cyber Defense Analyst.
About Our Organization:
The U.S. Army is wealth of possibilities for your future - whether you are looking to build a meaningful career, continue your education, or start a family, the Army is committed to helping you build the future you are looking for and improve yourself in the process. Be All You Can Be.
Now Hiring Full and Part Time Positions.
***Click apply for an Interview***
Information Security Analyst - Threat Intelligence
Cyber Security Analyst Job 37 miles from Union City
pAre you passionate about the changing threat landscape, love the challenge of understanding how the latest malware works, and can evangelize the risks and issues across a broad organization? Are you looking for a challenging leadership position that will allow you to shape the future of security across the internet? Do you thrive on working with a close-knit, highly-motivated team?/p
pCome join Lancope's threat intelligence team to help protect Lancope's customers against cyber-attacks. The successful candidate will join a global team of senior security analysts focusing on the changing threat landscape and effect on Lancope's customers. This position requires a professional with a strong security software and threat analysis background that is capable of identifying and establishing the relationships and processes within and external to Lancope to build an investigative threat research structure and flow. The team will source data across Lancope, i.e. internal product and traffic monitoring groups, as well as through external partner and qualified third-party relationships./p
pLancope is looking for a full time Information Security Analyst for Lancope's Threat Intelligence Team. Analysts in this role will have experience in threat research and a desire to own innovative ideas from invention, through proof-of-concept, and to deployment. /p
p/p
pstrong Primary Responsibilities/strong /p
ul
li Conduct literature reviews and keep abreast of state of the hack, data sources, data analysis techniques and big data/li
li Invent and/or apply new techniques to telemetry data on a global scale and identify new security threats/li
li Develop and document proofs-of-concept (POCs) to demonstrate the efficacy, performance, and scalability of new techniques/li
li Publish and present research findings, including methodology and measured efficacy improvements/li
li Help guide the development by working with product teams/li
li Partner to turn successful POCs into product features and actionable intelligence.strong /strong/li
/ul
p/p
pstrong Education and Experience /strong /p
pThe ideal candidate for this role brings considerable experience, motivation, and organization along with both intense curiosity and desire to make an impact in internet security. Researchers in this role enjoy considerable latitude and work hands-on to complete all phases of applied research. The successful applicant will have demonstrable skills in some of the below areas:/p
ul
li At least 2 years relevant experience /li
li Network administration, System administration (Windows or Unix)/li
li IT security with a focus on computer forensics, incident response, malicious code/exploits, anti-virus, etc. /li
li Knowledge of the current security threat landscape, especially network and web-based threats/li
li Familiar with Windows exploits, malware and malicious code trends /li
li Knowledge of TCP/IP and application in securing systems, investigating security incidents/li
li Solid understanding of computer science fundamentals, software engineering/li
li Knowledge of one or more programming/scripting languages /li
li Web application and script development/li
li Log and data analysis/li
li Strong written and verbal communication/li
li Self-motivated and highly ambitious/li
li Creative problem solving skills and excellent troubleshooting/debugging skills/li
li Excellent teamwork and people skills/li
li Ability to manage multiple tasks and work towards long-term goals/li
li Incident response experience a definitive plus/li
/ul
p /p