Post job

Cyber security analyst jobs in Urban Honolulu, HI

- 44 jobs
All
Cyber Security Analyst
Information Systems Security Officer
Information Security Analyst
Security Engineer
Information Security Engineer
Defense Analyst
Network Security Analyst
Senior Cyber Security Analyst
Information Assurance Analyst
Securities Analyst
  • NOSC Cyber Analyst

    Teksystems 4.4company rating

    Cyber security analyst job in Urban Honolulu, HI

    Aloha! One of Hawaii's utility companies is seeking a technical specialist responsible for, monitoring, operating, and troubleshooting network and security status of any component comprising the assigned customer's networks, systems, and software. Additionally, he/she will also be a member of the Network Operations and Security Center (NOSC) team providing 24x7 operations and security monitoring for client. RESPONSIBILITIES: - 30% Perform pro-active monitoring of system and network element alarms and alerts to identify those components/elements that may lead to, or already are causing degradation or failure. - 30% Perform security monitoring and management, fault isolation and diagnostic functions to include determination and execution of corrective actions on a real-time basis. Use network and system management platforms to remotely access and analyze systems, nodes, and devices to identify resolutions to correct anomalies. - 10% Interface with functional users, other NOSC support personnel and management in both routine and reactive monitoring situations. Execute reporting and data input associated with NOSC operations and ticket management. - 10% Maintains inventory in conjunction with the Desktop Services Section of installed hardware and software and insures adequate maintenance coverage. - 10% Document data and telecommunication networks, network servers, software, and service configurations. Update and maintains configuration tables and drawings. Maintains up-to-date knowledge of IT, security, telecommunications, products, trends, and directions. - 10% Analyze network traffic data, throughput, reliability, and other characteristics related to efficient operation and support of networks and systems. Basic Qualifications and Knowledge Requirements: Thorough knowledge of the principles of information and office technology normally acquired through college level courses or equivalent experience. Thorough knowledge of data security and disaster recovery principles, IBM operating systems concepts, access methods, file structures and data communications normally acquired through specialized education and several years of professional experience. Work Environment 7x24 operations Must be able to work holidays Must be able to work night shifts, graveyard shifts and weekends. The 3 shifts are below 7-4 shift 3-12 shift 11-8 shift 5-6 month rotation Job Type & Location This is a Permanent position based out of Honolulu, HI. Pay and Benefits The pay range for this position is $60000.00 - $87000.00/yr. holidays, pto. no longer have a pension plan but their 401k plan is generous. they do have 10% employer match and the duration to get fully vested is 5 years. Workplace Type This is a fully onsite position in Honolulu,HI. Application Deadline This position is anticipated to close on Dec 23, 2025. h4>About TEKsystems: We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company. The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law. About TEKsystems and TEKsystems Global Services We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com. The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
    $60k-87k yearly 13d ago
  • Sr. Cyber Security Analyst - Top Secret Clearance (SCI Eligible)

    JFL Consulting

    Cyber security analyst job in Pearl City, HI

    Full-time Description With more than twenty years of securing some of the U.S. Department of Defense and the Intelligence Community's most critical networks, JFL Consulting, LLC provides advanced network security solutions to a range of US Government and US commercial clients. Our cybersecurity operators are experts at assessing and defending mission-critical data and the networks that facilitate their operation. We are focused on delivering advanced products and industry best practices that meet each customer's unique requirements. Visit ********************* Job Description JFL Consulting, LLC is seeking a Senior Cyber Security Operator to support critical cybersecurity operations within highly secure environments. This role offers the opportunity to work on advanced network defense strategies, with a unique focus on passive vulnerability analysis: a specialized and low-impact method of identifying risks without active scanning. You'll play a key role in detecting anomalies, analyzing complex systems, and strengthening network security for high-value missions. This position is ideal for professionals who enjoy deep technical work, problem-solving, and contributing to meaningful national security efforts within a collaborative, mission-driven team. Job Title: Senior Cyber Security Operator Place of Performance: Pearl Harbor HI, 96701 Mandatory Requirements: Top Secret Clearance (SCI Eligible) Experience Level: Senior-Level (8+ years in cybersecurity, 3+ years in passive vulnerability analysis) Responsibilities: Ensure the safe and proper functional operation of the toolkit and its components. Collect and document measures of performance per approved CONOPS. Analyze and document behaviors, characteristics, and attributes of a network's baseline activity within steady-state operations. Analyze and investigate potential anomalies or outliers from established baseline. Analyze and identify misconfigurations, faults, and vulnerabilities within the network's architecture, subcomponents, and utilized communication protocols. Determine root source of anomalies and extent of vulnerable findings for validation with system users and administrators. Document and report anomalies to appropriate channels for further investigation and notification. Document vulnerable findings and provide recommendations through appropriate channels that increase both security and operational capacity of the respective network. Recommend improvements to current operations for potential incorporation into the overall program. Collaborate with cross-functional teams to support incident response, system hardening, and policy development as needed. Additional duties as assigned 5-10% Conus Travel Requirements Education: Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or a related field preferred. Equivalent work experience may be considered in lieu of a degree. A master's degree is a plus. Certifications: Must hold an IAT Level II certification as defined and described in DoDD 8570.01, 8570.01-M, and 8140.01-03, and as amended. (e.g., Security+ CE, CySA+, CCNA Security, GSEC). Must hold a CSSP Analyst certification as defined and described in DoDD 8570.01, 8570.01-M, and 8140.01-03, and as amended. (e.g., CEH, CySA+, GCIA, GCIH). Preferred: Advanced certifications such as CISSP (Certified Information Systems Security Professional), OSCP (Offensive Security Certified Professional), or similar. Experience: Minimum 8 years in cybersecurity operations or analysis Minimum 3 years of experience with passive vulnerability detection techniques Experience supporting DoD or Intelligence Community networks Technical Skills: Practical experience with firewalls, network TAPs, IDS/IPS, endpoint protection, and other network defense technologies Adept in evaluating network protocols utilizing network analyzers, such as Wireshark, Tshark, and tcpdump Experienced in analyzing network datasets, including Zeek and firewall logs, to support threat hunting and security investigations. Experienced in leveraging data analysis platforms, such as Splunk, Kibana, and Arkime, to detect and analyze anomalous network activity Proficient in triaging Suricata alerts, tuning rules, and creating custom detections. Knowledge: In-depth understanding of network vulnerabilities and misconfigurations Strong knowledge of cybersecurity principles, adversary techniques, and detection/response strategies Experience working within the framework of a CONOPS or similar operational document Awareness of DoD cybersecurity frameworks (e.g., RMF, CMMC, NIST 800-53) and their application in secure system design and monitoring. Knowledge of common enterprise network architectures and defense mechanisms Experienced in analyzing TCP/IP, DNS, HTTP/S, SSL/TLS, SMB, and RDP protocols to identify vulnerabilities, misconfigurations, and indicators of malicious activity. Soft Skills: Strong analytical and investigative mindset Excellent documentation and reporting skills Effective communicator with ability to explain technical issues to both technical and non-technical audiences Comfortable working independently and as part of a cross-functional team Competitive Benefits Package Includes: 100% employer-paid medical, dental, and vision for employees and dependents 401(k) with 3% company contribution and immediate vesting Generous PTO policy (15 vacation, 5 sick, 2 personal days) Reimbursement for job-related certifications, generous training budget and company provided access to training platforms. JFL Consulting, LLC is an Equal Opportunity Employer. We do not discriminate against any applicant for employment on any legally recognized basis including, but not limited to: race, religion or creed, color, national origin, sex, age, disability, marital status, sexual orientation, genetic information, veteran status, status with regard to public assistance or any other protected class under federal, state or local statute. It is also the policy of JFL Consulting, LLC to provide reasonable accommodations for qualified individuals with disabilities.
    $73k-93k yearly est. 4d ago
  • Information Assurance Analyst

    Cymertek

    Cyber security analyst job in Urban Honolulu, HI

    Information Assurance AnalystLOCATIONHonolulu, HI 96815CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are seeking a detail-oriented and proactive Information Assurance Analyst to join our team and safeguard critical information systems. In this role, you will play a key part in identifying, assessing, and mitigating security risks to ensure compliance with organizational policies and industry standards. Collaborating with technical teams, you will implement best practices, monitor systems for vulnerabilities, and provide solutions to enhance security. If you are passionate about protecting sensitive data and thrive in a dynamic, fast-paced environment, we encourage you to apply! *** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. *** SIMILAR CAREER TITLESCybersecurity Analyst, Security Analyst, Information Security Specialist, Risk Management Analyst, Compliance Analyst, IT Security Analyst, Security Operations Analyst, Network Security Analyst, Vulnerability Analyst, Data Protection Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeDEGREE (Focus) Cybersecurity, Information Assurance, Computer Science, Information Technology, Systems Engineering, Network Security, Information Systems, Data Science, Risk Management, Software Engineering, etc.ALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES Identify and mitigate security risks Conduct system vulnerability assessments Monitor compliance with security policies Implement security best practices Document security incidents and resolutions Collaborate with IT and security teams REQUIRED SKILLS Knowledge of security frameworks Risk assessment and analysis Incident response techniques Proficiency in security tools Understanding of access control Strong analytical thinking DESIRED SKILLS Familiarity with SIEM platforms Experience with penetration testing Knowledge of cloud security Understanding of compliance standards (e.g., NIST, ISO) Familiarity with encryption protocols Proficiency in security automation tools PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development. At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day. We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave. Ready to make your next move the best one? Join us and experience the difference. BENEFITS Excellent Salaries Flexible Work Schedule Cafeteria Style Benefits 10% - 401k Matching (Vested Immediately) Additional 401k Profit Sharing 30 days Paid Leave/Holiday (No Use or Lose!) The day off for your birthday Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus) HSA/FSA AFLAC Long Term/Short Term Disability - 100% employee coverage. No cost to you. Life Insurance - 100% employee coverage. No cost to you. Additional Discretionary Life Insurance Paid Training No long, wordy reviews with tons of paperwork!!! Referral bonus program with recurring annual payments HOW TO APPLY Email us at ***************** or apply today: **************** Want to see what our employees think? Click here . EQUAL OPPORTUNITY EMPLOYER STATEMENT Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
    $64k-81k yearly est. Easy Apply 60d+ ago
  • Computer Network Defense (CND) Analyst 3 (CCAs Accepted)

    Wyetech

    Cyber security analyst job in Urban Honolulu, HI

    At Wyetech, you'll be at the center of an award-winning corporate culture, breaking technological barriers and solving real-world problems for our federal government customers. We are committed to hiring the best of the best, and in return, we offer a world-class, truly unique employee experience that is rare within our industry. Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment. Due to federal contract requirements, United States Citizenship and position appropriate security clearance is required. (e.g. Active TS/SCI security clearance with agency appropriate polygraph). Required Qualifications TS/SCI with agency appropriate poly Ten (10) years of experience and an Associate's Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). OR Eight (8) years of experience and an Bachelor's Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). OR Six (6) years of experience and an Master's Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). OR Four (4) years of experience and an Doctorate Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Relevant Experience Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree Required Technical Skills Excellent communication and collaboration skills to interface across NSA Be able to ACTIVELY participate in leadership/IC exchanges Strong verbal and written communication skills Be able to identify intrusions and actors current intrusion sets commercial Cybersecurity Firms Need an understanding of Virtual Private Servers, VPNs, and The Diamond Model obfuscation networks Highly proficient Agency tools: DX, BuffaloBuffalo, CLEARVISION, CVEs, SSVE, VirusTotal Author and read highly technical reports The Benefits Package Wyetech believes in generously supporting employees as they prepare for retirement. The company automatically contributes 20% of each employee's gross compensation to a Simplified Employee Pension (SEP) IRA, with no requirement for employee matching. All contributions are fully vested from day one, ensuring immediate ownership of retirement funds. Additional benefits include: Wyetech provides a generous PTO plan of up to 200 hours annually, aligned with applicable state leave regulations. Employees have the flexibility to adjust their PTO allocation at the start of each calendar year, ensuring it meets their evolving needs. Full-time employees have the option to participate in a variety of voluntary benefit plans including: A Choice of Medical Plan Options, some with Health Savings Account (HSA) Vision and Dental Life and AD&D Benefits Short and Long-Term Disability Hospital Indemnity, Accident, and Critical Illness Insurances Optional Identity Theft and Legal Protection Services Company Environment & Perks Employee Referral Bonus Eligibility up to $10,000 Mobility Among Wyetech-supported Contracts Various contract and work locations throughout Maryland, Virginia, Colorado, Texas, Utah, Alaska, Hawaii and OCONUS Various team-building events throughout the year such as: monthly lunches, summer company picnic, and an annual holiday party. Employees receive two complementary branded clothing orders annually. Wyetech, LLC is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Affirmative Action Statement: Wyetech, LLC is committed to the principles of affirmative action in all hiring and employment for minorities, women, individuals with disabilities, and protected veterans. Accommodations: Wyetech, LLC is committed to providing an inclusive and accessible hiring process. If you need any accommodations during the application or interview process, please contact Brittney Wood. at 844-WYETECH x727 or ********************. We are happy to provide reasonable accommodations to ensure equal access to all candidates.
    $61k-77k yearly est. Auto-Apply 60d+ ago
  • Detection & Response Security Engineer, Threat Intelligence

    Meta 4.8company rating

    Cyber security analyst job in Urban Honolulu, HI

    Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. You will help the team establish, lead and execute multi-year roadmaps that improve research efficiency and quality across the team, and drive improvements to stakeholder management across a broad range of intelligence requirements. **Required Skills:** Detection & Response Security Engineer, Threat Intelligence Responsibilities: 1. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects 2. Build, cultivate, and maintain impactful relationships with intelligence stakeholders to identify and facilitate solutions to increase the impact of the team's work 3. Refine operational metrics, key performance indicators, and service level objectives to measure Intelligence research and services 4. Lead cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions 5. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network 6. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences 7. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations 8. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems **Minimum Qualifications:** Minimum Qualifications: 9. 8+ years threat intelligence experience 10. B.S. or M.S. in Computer Science or related field, or equivalent experience 11. Be a technical and process subject matter expert regarding Security Operations and Threat Intelligence services 12. Experience developing and delivering information on threats, incidents and program status for leadership 13. Expertise with campaign tracking techniques and converting tracking results to long term countermeasures 14. Expertise with threat modeling frameworks, such as Diamond Model or/and MITRE ATT&CK framework 15. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks 16. Proven track record of managing and executing on short term and long term projects 17. Ability to work with a team spanning multiple locations/time zones 18. Ability to prioritize and execute tasks with minimal direction or oversight 19. Ability to think critically and qualify assessments with solid communications skills 20. Coding or scripting experience in one or more scripting languages such as Python or PHP **Preferred Qualifications:** Preferred Qualifications: 21. Experience recruiting, building, and leading technical teams, including performance management 22. Experience close collaborating with incident responders on incident investigations 23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems 24. Familiarity with malware analysis or network traffic analysis 25. Familiarity with nation-state, sophisticated criminal, or supply chain threats 26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort 27. Experience in one or more query languages such as SQL 28. Experience authoring production code for threat intelligence tooling 29. Experience conducting large scale data analysis 30. Experience working across the broader security community **Public Compensation:** $177,000/year to $251,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $177k-251k yearly 54d ago
  • Computer Network Defense Analyst Senior Level

    Integrity Technology 3.7company rating

    Cyber security analyst job in Wahiawa, HI

    ITC is a Woman Owned Small Business delivering exceptional consultation to the U.S. Government in Systems/Software Engineering, Cybersecurity Solutions, Mission Operations/INTEL Analysis, and Management Services in order to enable our customers to solve the most challenging problems. With continued growth comes opportunity, and we are currently searching for a Top-Secret SCI with polygraph-cleared Senior-Level Digital Network Exploitation Analyst. Responsibilities: The Computer Network Defense Analyst will use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment. Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance , and/or systems engineering. Additionally, must have experience in netowrk or system administation. If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undgergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). Requirements TS/SCI with CI or FS Poly Required 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree (applicable to Level 1 - Level 4). With an Associate's Degree, at least 10 years demonstrated experience related to . With a Bachelor's Degree, at least 8 years demonstrated experience related to . With a Master's Degree, at least 6 years demonstrated experience related to . With a Doctorate Degree, at least 4 years demonstrated experience related to job description. Benefits for this position include: 401K plan with company contributions (safe harbor and profit sharing) 11 Federal holidays, 21 Days PTO Medical, Dental, & Vision with substantial company contributions Company provided Life, LTD and STD Insurance Health Savings Accounts/ Flexible Spending Accounts Referral Bonuses Performance Bonuses Tuition Assistance for Education, Training, and Professional certifications Career Development Many factors can influence final salary including, but not limited to relevant prior work experience, specific skills and competencies, education, and certifications. Final salary can also be influenced by a position's geographic location, Federal Government contract labor categories, and contract wage rates. The salary Range for this position is: $100,000-200,000 ITC is an Equal Opportunity employer. Qualified applicants or employees will receive consideration for employment without regard to race, color, religion, ethnic or national origin, ancestry, age, sex, sexual orientation, gender identity, pregnancy (including childbirth or related condition) citizenship, familial status, mental or physical disability status, veteran status, genetic information, other non-disqualifying disability, or any other characteristic protected by law.
    $67k-82k yearly est. 60d+ ago
  • Senior Information Systems Security Officer (ISSO)

    SOSi

    Cyber security analyst job in Aiea, HI

    Founded in 1989, SOSi is among the largest private, founder-owned technology and services integrators in the defense and government services industry. We deliver tailored solutions, tested leadership, and trusted results to enable national security missions worldwide. Job Description Join SOSi and Shape the Future of Secure Networks in the Pacific! SOSi is seeking a Secret-cleared Senior Information Systems Security Officer (ISSO) to join our elite team at Hickam AFB, Hawaii. We design and deliver secure, resilient, and innovative network infrastructures that power USINDOPACOM's mission and connect 5,000+ customers across the Pacific theater. As part of our team, you'll tackle complex cybersecurity challenges, architect unique solutions, and help deploy a private cloud platform that empowers the warfighter. If you're ready to make an impact with cutting-edge technology and ensure the health and security of enterprise systems spanning hundreds of embedded devices, this is your opportunity to lead from the front. Principal Duties: Assist the ISSM in developing and maintaining a formal information system (IS) security program and policies for their assigned area of responsibility. Provide technical and procedural IS Security advice to engineering team and senior management regarding the RMF process. Establish and maintain computer systems and networks for classified processing, responsible for administration, maintenance, and security auditing. Develop and oversee operational information systems security implementation policy and guidelines. Maintain a repository using eMASS with all security authorizations for IS under their purview. Coordinate IS security inspections, tests, and reviews. Ensure proper measures are taken when an IS incident or vulnerability is discovered. Ensure development and implementation of an effective IS security education, training, and awareness program. Ensure Configuration Management policies and procedures for authorizing the use of hardware/software on an IS are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the appropriate AO prior to the addition, change or modification. Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures. Manage, maintain, and execute the information security continuous monitoring plan. Ensure records are maintained of all security-related vulnerabilities and ensure serious or unresolved violations are reported to the AO/DAO. Assess changes to the system, its environment, and operational needs that could affect the security authorization. Qualifications Minimum Requirements Active Secret DoD security clearance. Bachelor's degree in a related field plus 4 years of related experience. DoD 8570 IAT-II compliant (Security+ CE, CCNA, CND, CySA+, GICSP, GSEC, or SSCP). Knowledge of NSA's Commercial Solution for Classified (CSfC) solution and Cross Domain Solutions (CDS). Thorough understanding of NIST Publication 800-53r5, Risk Management Framework, Executive Order 14028, and OMB Mandate M-22-09. Prior experience with eMASS. Strong communication skills and ability to coordinate tasks across functional groups. Preferred Qualifications Master's degree in Information Technology or related discipline Recent experience supporting system authorizations. Additional Information Work Environment: Working conditions are normal for an office environment. Fast paced, deadline-oriented environment. May require periods of non-traditional working hours including consecutive nights or weekends. Target Salary Range: $110,556 to $136,257. Working at SOSi: All interested individuals will receive consideration and will not be discriminated against for any reason.
    $110.6k-136.3k yearly 12d ago
  • Information System Security Officer (ISSO)

    Raft Company Website

    Cyber security analyst job in Urban Honolulu, HI

    This is a U.S. based position. All of the programs we support require U.S. citizenship to be eligible for employment. All work must be conducted within the continental U.S. Who we are: Raft (********************* is a customer-obsessed non-traditional small business with a purposeful focus on Distributed Data Systems, Platforms at Scale, and Complex Application Development, with headquarters in McLean, VA. Our range of clients includes innovative federal and public agencies leveraging design thinking, cutting-edge tech stack, and cloud-native ecosystem. We build digital solutions that impact the lives of millions of Americans. About the role: As an Information System Security Officer (ISSO), you will expertly manage the security aspects of our cutting-edge platforms and systems designed for our esteemed clients. The ISSO will play an instrumental role in generating and maintaining the necessary artifacts to achieve and sustain Authority to Operate (ATO) while working in close collaboration with our development team. This collaboration ensures the seamless integration of security controls early in the development lifecycle. You will audit and monitor all of the platforms & tooling across the customer environment. This role requires a deep understanding of cybersecurity principles, federal compliance requirements, and a passion for safeguarding national security infrastructure. What we are looking for: • Minimum of 4 years' experience in ISSM/O roles • Proven experience in obtaining and maintaining ATO for classified government cloud systems, adhering to DoD policies such as Risk Management Framework (RMF), NIST 800-53 Rev 4 and 5, NIST 800-37, NIST 800-60 and more • Skilled in crafting eMASS packages and implementing DISA STIGs • Proficient in conducting risk assessments, audits, and compliance monitoring within DoD environments • Demonstrated proficiency in managing and creating Body of Evidence (BOE) artifacts, including POA&Ms, SSPs, RARs, Vulnerability Assessments, Security Assessment Plans, etc. • Understanding of and experience with SIEM tools such as Splunk, Grafana, or ELK • Proficient in conducting continuous monitoring activities such as auditing, configuration reviews, policy & procedure reviews, etc. • Demonstrated experience managing compliance activities for both on-prem & cloud-based (AWS) systems & networks • Track record of leading programs/projects in attaining ATO • Experience conducting internal self-assessments and audits with external assessors • In-depth understanding of Network Rules, Platforms, and Application development • Familiarity with cloud-native, scalable services • Experience with common cybersecurity tools and technologies such as vulnerability & compliance scanners, anti-malware, code analyzers, IDS/IPS, DLP, SBOM, etc. • Experience building and maintaining Standard Operating Procedures • Obtain Security+ or other DoD 8570 IAT Level II or higher certification within 6 months of employment with Raft Highly preferred: • Bachelor's degree in Cybersecurity, Information Assurance, Information Technology, or a related field. • CISSP, CISM, CISA, CGRC, or other DoD 8570 IAM Level 2 or higher certifications • Experience in a K8s DevSecOps environment, preferably with Platform One • Experience with FIPS (Federal Information Processing Standards) • Experience with writing/reviewing RMF control policies • Experience with Executive leadership (PMO office) • Knowledge of Cloud platforms and migrations • Previous experience as a Solution Architect • Engineering background • Experience in a software factory setting Clearance Requirements: Active Secret with the ability to obtain and maintain a Top Secret security clearance Work Type: Onsite in Honolulu, HI May require up to 35% travel to both CONUS and OCONUS locations (Must possess a valid, active US passport with at least six months validity beyond intended period of employment to facilitate international travel and meet security requirements for government contracts.) Salary Range: $180,000 - $220,000 The determination of compensation is predicated upon a candidate's comprehensive experience, demonstrated skill, and proven abilities What we will offer you: Highly competitive salary Fully covered healthcare, dental, and vision coverage 401(k) and company match Take as you need PTO + 11 paid holidays Education & training benefits Generous Referral Bonuses And More! Our Vision Statement: We bridge the gap between humans and data through radical transparency and our obsession with the mission. Our Customer Obsession: We will approach every deliverable like it's a product. We will adopt a customer-obsessed mentality. As we grow, and our footprint becomes larger, teams and employees will treat each other not only as teammates but customers. We must live the customer-obsessed mindset, always. This will help us scale and it will translate to the interactions that our Rafters have with their clients and other product teams that they integrate with. Our culture will enable our success and set us apart from other companies. How do we get there? Public-sector modernization is critical for us to live in a better world. We, at Raft, want to innovate and solve complex problems. And, if we are successful, our generation and the ones that follow us will live in a delightful, efficient, and accessible world where out-of-box thinking, and collaboration is a norm. Raft's core philosophy is Ubuntu: I Am, Because We are. We support our “nadi” by elevating the other Rafters. We work as a hyper collaborative team where each team member brings a unique perspective, adding value that did not exist before. People make Raft special. We celebrate each other and our cognitive and cultural diversity. We are devoted to our practice of innovation and collaboration. We're an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status.
    $74k-95k yearly est. Auto-Apply 1d ago
  • Security Cooperation Analyst (Periphery CFT), SOCPAC

    The Unconventional

    Cyber security analyst job in Urban Honolulu, HI

    The Unconventional is seeking a qualified Security Cooperation Analyst (Periphery CFT) to support our team. The Security Cooperation Analyst (Periphery CFT) is aligned to periphery countries in the INDOPACOM Area of Responsibility. The team plans and coordinates the full range of special operations for Special Operations Command Pacific (SOCPAC) operations, activities and investments (OAIs) within the Periphery in support of the USINDOPACOM campaign plan. The Security Cooperation Analyst (Periphery CFT) will shepherd OAIs specific to Security Cooperations (SC) programs within their assigned portfolio area from inception to completion and as directed by COMSOCPAC and the SOCPAC Director of Operations (SOJ3). Specific duties may include, but are not limited to: Manages multiple SC programs to include Title 10 USC 312,321,322, 333, 345, and APRI. Engages with foreign partners to synchronize regional efforts abroad. Review Annual Proposal and Training & Equipment List from subordinate JSOTF submissions. Provides support Provides support to Global Force Management to ensure timely deployment of SOCOM forces for operational use. Responsible for continuity of information between rotational units and headquarters. Forward integration during RIP/TOA periods will be required. Coordinate with Defense Security Cooperation Agency for tracking of annual 333 submissions and OAIs. Coordinate with component commands for implementation of 333 OAIs. Collaborate with receipt partner units to determine capability gaps in line with SOCPAC requirements. Consolidate annual assess, monitor, and evaluate reports to integrate into future campaign planning. Coordinate Title 10 and APRI projects through the Overseas Humanitarian Assistance Shared Information System (OHASIS). Responsible for integration SC resources and plans into the Country Integration Plans and the SOCPAC Campaign Plan. Attend SC planning conferences as required abroad and in the United States. Requirements Required Qualifications: Must be able to conduct periodic (~4-6 weeks annually) theater and CONUS travel ISO conference and program familiarity. Must possess or be able to obtain a TS/SCI security clearance. Must possess proficiency in Microsoft Excel. 3+ years of experience managing people and teams. Requires 2-3 years of Security Cooperation Experience. Knowledge of Security Cooperation Authorities, Objectives, Primary Stakeholders and Processes. Prefer 2-3 years of Special Operations Experience. Clearance: Requires an active Top-Secret / SCI clearance. Location: Camp Smith, HI Travel: CONUS and OCONUS travel will be required.
    $58k-75k yearly est. 38d ago
  • Information Security Risk Analyst

    American Savings Bank 4.5company rating

    Cyber security analyst job in Urban Honolulu, HI

    Primary Purpose of Job Supports the company's information security program to ensure that policies, procedures, standards and practices are in place to adequately identify, assess, mitigate, manage, monitor and report on key information security risks. Major Job Accountabilities Works with IT and internal operations to ensure safeguarding of all confidential, proprietary, privileged, and protected information assets, including customer data. Monitors essential processes to ensure compliance with policies, standards, practices, and guidelines. Assists in verifying compliance with information security requirements of applicable laws, regulations, and Bank policies and procedures, including but not limited to GLBA, FACTA, PCI DSS, Anti-Money Laundering laws and regulations, Bank Secrecy Act, and USA PATRIOT Act. Develops and performs information security and vulnerability assessments, including testing of applications, systems, and infrastructure to ensure appropriate protection of sensitive customer and company information. Conducts risk analyses and recommends remediation for deficiencies. Tracks and assesses remediation(s) to ensure compliance with policies and operational standards. Performs information security risk management activities including information security risk assessments, vendor risk reviews, and monitoring remediation of identified gaps and issues. Develops reports on key program effectiveness metrics, including analytics for actionable insights. Ensures technical enforcement and effectiveness of internal security controls to maintain integrity of organizational networks, systems, and applications. Develops and conducts bank-wide/departmental information security training. Maintains current knowledge of evolving information security risks, particularly regarding cyber security, trends with risk mitigation tools, and changes to industry regulations affecting financial institutions. Recommends, maintains, develops, and revises all information security governance documentation. Builds and matures a culture focused on the proactive awareness and improvement of the information security risk environment. May occasionally work evening/night hours as needed to address critical situations. Experience Required Minimum of four (4) years of the following experience: Direct experience in developing information security programs and assessing effectiveness of such programs, preferably within a financial services organization. Experience with risk management frameworks, internal controls, and risk concepts. Experience with information security frameworks and general areas of information security. Required Skills or Training Verified self-motivated learner bringing a sense of enthusiasm to a hands-on working environment, with the ability to independently research and develop solutions to unique challenges. Knowledge of risk management, business process design, and risk concepts with a background in financial, regulatory, information security, and/or enterprise risk management. Proven critical thinker with the ability to research, assess, and effectively communicate IT risks and develop, recommend, and monitor corresponding controls. Proven excellent interpersonal, verbal, and writing skills to clearly communicate to a diverse audience, with verified ability to build and maintain relationships across diverse technical and non-technical teams. Established acute analytical skills, including the ability to consolidate broad data sets from multiple sources, both internal and external, to identify patterns and/or risk factors. Verified knowledge and experience with a broad range of security frameworks and standards such as PCI, NIST, ISO 2700 series, etc. Knowledge of the SOX, Federal Financial Institutions Examination Council (FFIEC) and section 501(b) of the Gramm-Leach-Bliley Act. Ability to independently apply risk management concepts in various and novel situations to accurately identify, assess, and conclude on risks, while also determining alternatives or designing mitigating controls/activities. Knowledge and experience with several networking, operating systems, platforms, client/server, web applications, and general information security technologies is a plus. Knowledge and experience with General IT Controls (GITC) and maturity models from various frameworks (SOX, FFIEC, CIS, etc.) is a plus. EOE, including disability/veterans At American Savings Bank, we welcome and support all individuals and celebrate the diversity of our team members, customers and community. We are committed to ensuring that our online application process is accessible and provides an equal employment opportunity to all job seekers. If you need assistance searching for a job or submitting an application, please contact us by calling ************ and a member of our Recruitment team will follow up with you. Mahalo for your interest in American Savings Bank!
    $85k-111k yearly est. Auto-Apply 60d+ ago
  • Information Systems Security Officer (ISSO)

    Valiant Integrated Services

    Cyber security analyst job in Schofield Barracks, HI

    Valiant Integrated Services is seeking an experienced, highly skilled Information System Security Analyst to act as Information Systems Security Officer (ISSO) to join our professional team protecting mission training services for a Mission Training Complex (MTC) on Schofield Barracks, HI. Duties and Responsibilities Develop and maintain an organizational or system-level cybersecurity program that includes cybersecurity architecture, requirements, objectives and policies, cybersecurity personnel, and cybersecurity processes and procedures. Provide support to the System Owner and the ISSM for maintaining the appropriate operational IA posture for a system, program, or enclave. Provide support to the customer on all matters involving the security of their information systems. Assist with the management of all security aspects of the information system and as assigned performs day-to-day security operations of the system. Assist in the development of the system security policy and ensures compliance with that policy on a routine basis. Prepare, validate, and maintain security documentation including, but not limited to: system security plan (SSP), risk assessment (RA), contingency plan (CP), privacy impact assessment (PIA), eAuthentication assessment, FIPS categorization. Provide configuration management for security-relevant information system software, hardware, and firmware, controlling changes to the system and assessing the security impact of those changes. Identify and mitigate security business and system risks. Identify and manage POA&Ms through remediation as well as develop corrective action plans for each POA&M. Maintain a repository for all organizational or system-level cybersecurity-related documentation such as DIACAP/RMF processes within eMASS or other automated process. Maintain Defense Information Technology Portfolio Registry (DITPR) for client systems and software. Ensure implementation of Information System (IS) security measures and procedures, including reporting incidents to the Command Information System Security Manger (ISSM) and appropriate reporting chains as well as coordinating system-level responses to unauthorized disclosures in accordance with DoDM 5200.01 Vol 3 for classified information or DoDM 5200.01 Vol 4 for CUI, respectively. Implement and enforce all DoD IS and Platform Information Technology (PIT) system cybersecurity policies and procedures, as defined by cybersecurity-related documentation. Ensure that all users have the requisite security clearances and access authorization, and are aware of their cybersecurity responsibilities for DoD IS and PIT systems under their purview before being granted access to those systems. In coordination with the ISSM, initiate protective or corrective measures when a cybersecurity incident or vulnerability is discovered. Establish a process for authorized users to report all cybersecurity-related events and potential threats and vulnerabilities to the ISSO. Ensure that all DoD IS cybersecurity-related documentation is current and accessible to properly authorized individuals. Ensures proper Configuration Management procedures are followed. Prior to implementation and contingent upon necessary approval with the ISSM. Initiates requests for temporary and permanent exception, deviations, or waivers to IA requirements such as Plan of Action and Milestones (POA&Ms). Ensures IA and IA-enabled software, hardware and firmware comply with appropriate security configuration guides. Provide status updates of assigned duties to the appropriate agency heads as defined in their respective Service Level Agreement (SLA). Respond to all applicable data calls, CTO's, FRAGO's, IAVA's ,etc within the requested timeframe. Attend all Cybersecurity Workforce Meetings when requested. Required Education and Experiences A bachelor's degree plus 3 years of recent specialized experience OR an associate's degree plus 7 years of recent specialized experience OR a major certification plus 7 years of recent specialized experience OR 11 years of recent specialized experience. Required to have active U.S. Top Secret/SCI security clearance with the ability to pass a CI/Polygraph exam. Baseline DoDI 8570 IA Certifications are required - a current CompTIA Security+ or greater certification. A higher level certification, such as GSLC, CAP, CASP, CISM, CISSP, is also appropriate. Desired Skills and Qualifications A working knowledge of RMF and the security authorization processes and procedures. Knowledge of NIST Special Publications and their counterparts, especially SP800-37, SP800-53, ICD 503, and CNSS 1253. Ability to communicate clearly and present information to the customer in a format they can understand. Experience in several of the following areas: knowledge of current security tools, hardware and software security implementation; different communication protocols; and encryption techniques/tools. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services. Must be able to prioritize tasks, deliver solutions on time and be a team player with the ability to work independently and proactively while being flexible and prioritizing competing priorities, often under time constraints. Have strong analysis, oral and written communication, and change management skills with ability to plan, organize, prioritize, track, manage, and learn new skills. It is preferred that a candidate have at least one year of experience under the DoD Information Assurance Certification and Accreditation Process (DIACAP) and/or Risk Management Framework (RMF) accreditation process and has a familiarity with Enterprise Mission Assurance Support Service (eMASS). Technical familiarity with Windows 7 Enterprise/Windows 10 Professional, Windows Server 2012, and Red Hat Linux. Experience with providing IA or IT support to a US Army client desirable, but not required. Proficiency with using the Internet and with Microsoft Office products including e-mail, Word, Excel, Access and Project is required. Completion of required certifications required within six (6) months of hire date. *****************************************
    $74k-95k yearly est. Auto-Apply 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Urban Honolulu, HI

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 32d ago
  • Info Tech Security Analyst I - IT Security_QHS (Full-Time, 40 Hours, Day Shift)

    Queen's Health System 4.8company rating

    Cyber security analyst job in Urban Honolulu, HI

    RESPONSIBILITIES I. JOB SUMMARY/RESPONSIBILITIES: - Supports and maintains The Queen's Health Systems' (QHS) information security program. - Actively promotes awareness and training of QHS Security Policies and related security topics. - Key responsibilities include but is not limited to the following: o Management and support of QHS' information security technical controls, programs and policies. o Support QHS initiatives and projects by providing information security-related consultation and technical assistance. o Leads or assists in the design, planning, and implementation of security measures to ensure safety and security of all information systems assets and to enhance the security posture of the organization. o Serves as a subject matter expert in support of security risk management and the IT Risk Management Program. - Works closely with leadership, including the privacy, risk and compliance functions, to ensure compliance with regulatory requirements. II. TYPICAL PHYSICAL DEMANDS: All essential, designated by frequency. - Continuous: seeing, speaking, repetitive arm/hand motions, sitting, static gripping of an object for prolonged periods. - Frequent: standing, sitting, walking, finger dexterity, hearing. - Occasional: stooping/bending, carrying usual weight of 12 pounds, reaching above shoulder level. - Operates computer equipment and copy machines. III. TYPICAL WORKING CONDITIONS: - Not substantially subjected to adverse environmental conditions. - Work schedule includes providing 24 hours/7 days a week support as required. IV. MINIMUM QUALIFICATIONS: EDUCATION/CERTIFICATION AND LICENSURE: - Bachelor's degree in Information Technology (IT) or related field; or four (4) years experience in information technology and/or information security may be substituted for the educational requirement. - Current certification in at least one (1) of the following highly preferred: o Global Information Assurance Certifications (GIAC) o Certified Ethical Hacker (CEH) o Certified Information Security Manager (CISSP) o Certified Information Security Manager (CISM) B. EXPERIENCE: - In addition to the educational requirement, four (4) years of information security experience, preferably in healthcare, demonstrating in-depth knowledge and ability to independently design and manage complex security controls and processes. - Experience to demonstrate the following IT Security Management experience: o SIEM management and reporting o Incident Response/Management o Threat & Vulnerability Management o Security appliances & tools including IDS, IPS, web/e-mail filtering, DLP, etc. o Expertise with offensive tools such as: Metaspoit, Kali Linux, Cobalt Strike, Mimikatz or a similar tool. o Technical expertise in system security vulnerabilities and remediation techniques, network and web-related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, etc.). o Demonstrated ability to create complex scripts, develop tools, or automate processes in Python or other relevant command languages. o Highest level of technical expertise in cybersecurity, including deep familiarity with relevant penetration and intrusion techniques and attack vectors. Equal Opportunity Employer/Disability/Vet
    $68k-83k yearly est. 11d ago
  • Security Administrator/Information Security Specialist (0097556T)

    University of Hawaii System 4.6company rating

    Cyber security analyst job in Urban Honolulu, HI

    Title: Security Administrator/Information Security Specialist 97556T, pending position clearance Hiring Unit: Information Technology Services, Office of the VP for Information and Chief Information Officer Date Posted: December 4, 2025 Closing Date: January 11, 2026 Band: B Salary: salary schedules and placement information Full Time/Part Time: Full Time Temporary/Permanent: Temporary DUTIES & RESPONSIBILITIES(*denotes essential functions): * * As a member of the UH Information Security team, oversees, manages and maintains the UH information security data protection and compliance programs. * * Provides general and technical advice, problem-solving assistance, and answers to questions regarding the information security program, information security issues, compliance programs, policies, standards and procedures. * * Manages Security Information and Event Management (SIEM) system to collect, correlate, and analyze security logs and alerts from critical information systems and analyzes the information to detect, investigate, and respond to suspicious or malicious activity * * Develops and maintains an effective security awareness training program as necessary for UH employees and conducts regular ongoing training. * * Actively promotes and communicates security awareness and changes in policies, procedures or training to faculty, staff and students, and provides guidance to affected groups. * * Assists the UH Information Security team with ensuring compliance with external regulations, laws and standards such as but not limited to the DOD Cybersecurity Maturity Model Certification program, GDPR, PCI-DSS, HIPAA, FERPA, NIST 800-171, HRS 487N, HRS 92F & UH policies/procedures across the UH system. * * Performs information security risk assessments. Provides reports and/or recommendations on a regular basis to University officials, senior leadership, higher level personnel and functional groups on the operation and progress of efforts. * * Identifies potential compliance vulnerabilities and risk; develops and implements corrective action plans for resolution of issues. * * Consults and collaborates with other departments, external vendors, service providers and/or external institutions to correct security related vulnerabilities and events when detected. * * Continuously monitors security threats, security trends, technological developments and emerging practices in the information technology, information security and higher education industries. * * Manages and monitors various security hardware, tools, systems/networks and applications in cooperation with Information Technology Services (ITS) staff. * * Performs capacity planning, evaluation, management and implementation of new products and technologies associated with information security in cooperation with other personnel as needed to address new security deficiencies and threats. * * Leads security incident responses, investigations and emergency situations, including those involving policy and regulatory violations. Handles legal requests and provides remediation support as necessary. * * Performs analyses and investigations of reports of inappropriate use of technology or institutional/personal information, including any alleged computer or network security compromises, and assists with the reporting and resolution of such incidents. * * Implements, maintains and performs the appropriate processes for proper reporting of violations or potential violations to duly authorized reporting authorities and/or enforcement agencies as appropriate and/or required. * Reviews the work of and provides input and guidance on laws, rules, regulations and policy to other security team members; monitors, reviews and directs subordinates and student assistants as necessary. * Perform other related duties as directed by the Chief Information Security Officer, VP IT & CIO, General Counsel and/or other UH Officers or UH senior administrators. * * Other duties as assigned. MINIMUM QUALIFICATIONS * Possession of a pertinent baccalaureate educational degree in Computer Sciences, Information Security or related field and 5 years of progressively responsible professional information technology experience with responsibilities for information security of which 2 years of the experience must have been comparable in scope and complexity to the next lower payband in the University of Hawai'i broadband system; or any equivalent combination of education and/or professional work experience which provides the required education, knowledge, skills and abilities as indicated. * Considerable working knowledge of information security as demonstrated by the broad knowledge and understanding of the full range of pertinent standard and evolving information technology concepts, principles and methodologies. * Considerable working knowledge and understanding of the broad technology, systems, hardware and software associated with information security. * Demonstrated ability to recognize a wide range of intricate problems, use reasoning and logic to determine accurate causes, and apply principles and practices to determine, evaluate, integrate, and implement practical and thorough solutions in an effective and timely manner. * Demonstrated ability to interpret and present information and ideas clearly and accurately in writing, verbally and by preparation of reports and other materials. * Demonstrated ability to establish and maintain effective working relationships with internal and external organizations, groups, team leaders and members, and individuals. * If applicable, for supervisory work, demonstrated ability to lead subordinates, manage work priorities and projects, and manage employee relations. * Considerable knowledge of information security current practices and threat landscape. * Considerable working knowledge of current information security technologies and tools * Considerable working knowledge of computer forensics and investigative techniques. * Considerable working knowledge of international, federal, state and local laws, rules, regulations related to information security, privacy and higher education. * Demonstrated ability to speak, read, comprehend, interpret and write fluently in English. * Demonstrated ability to work cooperatively with leadership, supervisor, project staff, and customers in a team environment to accomplish tasks and meet deadlines. * Demonstrated ability to establish and maintain effective working relationships in a positive, service-oriented manner with others. * Demonstrated ability to develop effective training materials. * Demonstrated ability to conduct in-person or virtual training/workshops. * Demonstrated ability to learn and apply new technologies independently and in a timely manner using books, manuals, online research, and other resources. * Demonstrated ability to combine and apply skill sets from many areas of IT. * Working knowledge of management and use of a SIEM. * Working knowledge of systems, systems administration, and network hardware and administration. * Working knowledge of one or more programming or scripting language. * Working knowledge of Internet protocols (such as TCP/IP) and applications. * Ability to manage multiple projects. * Ability to travel out-of-state. * Ability to work a variable work schedule; and work outside normally scheduled work hours including day, night, weekend and/or holiday hours as directed. DESIRABLE QUALIFICATIONS * Certifications related to the information security area (e.g. CISSP, GIAC/GSEC, CISM, etc.) * Working knowledge of configuring and implementing technical security solutions. * Prior cybersecurity experience in or with higher education. TO APPLY: Click on the "Apply" button on the top right corner of the screen to complete an application and attached required documents. Note: If you have not previously applied for a position using NeoGov, you will need to create an account. Applicants must submit the following: * Cover letter to the selection committee indicating interest in the position and how the minimum and desirable qualifications are met, * Resume, * The names and contact information (telephone number and email addresses) of at least three (3) professional references, and * Copies of educational transcripts are acceptable; however, original official transcripts will be required at time of hire. Diplomas and copies will NOT be accepted. Transcripts issued from an institution outside of the United States of America (USA) require a course-by-course analysis with an equivalency statement from an agency having membership with the National Association of Credential Evaluation Services, Inc., verifying the degree equivalency to that of an accredited institution within the USA. Expense of the evaluation shall be borne by the applicant. Late or incomplete applications will not be considered. The application will be considered incomplete if any of the required documents/materials are not included or are unreadable. Please redact references to social security numbers and birthdate on submitted documents. Employment may be contingent on verification of credentials and other background information, including the completion of a criminal history check. Inquiries: **************, ******************* EEO, Clery Act, ADA The University of Hawai'i is an Equal Opportunity Institution and is committed to a policy of nondiscrimination in employment, including on the basis of veteran and disability status. For more information, visit: ******************************************** Employment is contingent on satisfying employment eligibility verification requirements of the Immigration Reform and Control Act of 1986; reference checks of previous employers; and for certain positions, criminal history record checks. In accordance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, annual campus crime statistics for the University of Hawai'i may be viewed at: ***************************************************** or a paper copy may be obtained upon request from the respective UH Campus Security or Administrative Services Office. In accordance with Article 10 of the unit 08 collective bargaining agreement, bargaining unit members receive priority consideration for APT job vacancies. As a result, external or non BU 08 applicants may not be considered for some APT vacancies. BU 08 members with re-employment rights or priority status are responsible for informing the hiring unit of their status. Accommodation Request: The University of Hawai'i complies with the provisions of the Americans with Disabilities Act (ADA). Applicants requiring a reasonable accommodation for any part of the application and hiring process should contact the EEO coordinator directly. Determination on requests for reasonable accommodation will be made on a case-by-case basis. For further information, please refer to the following link: *********************************************************
    $63k-83k yearly est. 18d ago
  • Security Engineer II

    Trustmark 4.6company rating

    Cyber security analyst job in Urban Honolulu, HI

    Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities. We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information. You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs. **Responsibilities:** + Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data. + Conduct vulnerability assessments and penetration testing to identify and mitigate risks. + Develop and implement security policies, standards, and procedures. + Monitor security systems and respond to incidents promptly and effectively. + Stay up-to-date with the latest cybersecurity threats and trends. + Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business. + Provide technical guidance and support to internal stakeholders. **Qualifications:** + Bachelor's degree in Computer Science, Information Technology, or a related field or + 3-5 Years of network engineering or cyber engineering experience + Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001). + Proficiency in network security, systems security, application security, and data security. + Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM). + Excellent problem-solving and analytical skills. + Strong communication and interpersonal skills. + Ability to work independently and as part of a team. **Preferred Qualifications:** + Certifications such as CISSP, CISA, or CEH. + Experience with cloud security (e.g., AWS, Azure, GCP). + Knowledge of scripting and programming languages (e.g., Python, PowerShell). Brand: Trustmark Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums. **For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability. Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match. When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives. At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
    $92k-115k yearly est. 60d+ ago
  • Product Security Engineer, AI

    Meta 4.8company rating

    Cyber security analyst job in Urban Honolulu, HI

    Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys. **Required Skills:** Product Security Engineer, AI Responsibilities: 1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more 2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities 3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products **Minimum Qualifications:** Minimum Qualifications: 4. BS or MS in Computer Science or a related field, or equivalent experience 5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development 6. Experience with exploiting common security vulnerabilities 7. Knowledge of common exploit mitigations and how they work 8. Coding and scripting experience in one or more general purpose languages **Preferred Qualifications:** Preferred Qualifications: 9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation 10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software that enables security processes 12. 8+ years of experience finding vulnerabilities in C/C++ code 13. Contributions to the security community (public research, blogging, presentations, bug bounty) 14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows **Public Compensation:** $177,000/year to $251,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $177k-251k yearly 60d+ ago
  • Network Security Analyst

    Cymertek

    Cyber security analyst job in Urban Honolulu, HI

    Network Security AnalystLOCATIONHonolulu, HI 96815CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies. *** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. *** SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES Monitor network traffic for anomalies Investigate and resolve security incidents Maintain and update security systems Generate and analyze security reports Assist in developing incident response plans Ensure adherence to security policies REQUIRED SKILLS Proficiency in monitoring tools like IDS/IPS Strong analytical and problem-solving skills Understanding of network protocols (TCP/IP, DNS) Knowledge of malware analysis tools Ability to interpret security logs Familiarity with vulnerability scanning tools DESIRED SKILLS Experience with advanced threat detection Knowledge of forensics methodologies Understanding of regulatory frameworks (e.g., GDPR, HIPAA) Experience with SOC workflows Familiarity with automation and scripting Knowledge of threat intelligence platforms PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development. At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day. We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave. Ready to make your next move the best one? Join us and experience the difference. BENEFITS Excellent Salaries Flexible Work Schedule Cafeteria Style Benefits 10% - 401k Matching (Vested Immediately) Additional 401k Profit Sharing 30 days Paid Leave/Holiday (No Use or Lose!) The day off for your birthday Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus) HSA/FSA AFLAC Long Term/Short Term Disability - 100% employee coverage. No cost to you. Life Insurance - 100% employee coverage. No cost to you. Additional Discretionary Life Insurance Paid Training No long, wordy reviews with tons of paperwork!!! Referral bonus program with recurring annual payments HOW TO APPLY Email us at ***************** or apply today: **************** Want to see what our employees think? Click here . EQUAL OPPORTUNITY EMPLOYER STATEMENT Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
    $70k-89k yearly est. Easy Apply 60d+ ago
  • Information System Security Officer (ISSO)

    Raft Company Website

    Cyber security analyst job in Urban Honolulu, HI

    Job Description This is a U.S. based position. All of the programs we support require U.S. citizenship to be eligible for employment. All work must be conducted within the continental U.S. Who we are: Raft (********************* is a customer-obsessed non-traditional small business with a purposeful focus on Distributed Data Systems, Platforms at Scale, and Complex Application Development, with headquarters in McLean, VA. Our range of clients includes innovative federal and public agencies leveraging design thinking, cutting-edge tech stack, and cloud-native ecosystem. We build digital solutions that impact the lives of millions of Americans. About the role: As an Information System Security Officer (ISSO), you will expertly manage the security aspects of our cutting-edge platforms and systems designed for our esteemed clients. The ISSO will play an instrumental role in generating and maintaining the necessary artifacts to achieve and sustain Authority to Operate (ATO) while working in close collaboration with our development team. This collaboration ensures the seamless integration of security controls early in the development lifecycle. You will audit and monitor all of the platforms & tooling across the customer environment. This role requires a deep understanding of cybersecurity principles, federal compliance requirements, and a passion for safeguarding national security infrastructure. What we are looking for: • Minimum of 4 years' experience in ISSM/O roles • Proven experience in obtaining and maintaining ATO for classified government cloud systems, adhering to DoD policies such as Risk Management Framework (RMF), NIST 800-53 Rev 4 and 5, NIST 800-37, NIST 800-60 and more • Skilled in crafting eMASS packages and implementing DISA STIGs • Proficient in conducting risk assessments, audits, and compliance monitoring within DoD environments • Demonstrated proficiency in managing and creating Body of Evidence (BOE) artifacts, including POA&Ms, SSPs, RARs, Vulnerability Assessments, Security Assessment Plans, etc. • Understanding of and experience with SIEM tools such as Splunk, Grafana, or ELK • Proficient in conducting continuous monitoring activities such as auditing, configuration reviews, policy & procedure reviews, etc. • Demonstrated experience managing compliance activities for both on-prem & cloud-based (AWS) systems & networks • Track record of leading programs/projects in attaining ATO • Experience conducting internal self-assessments and audits with external assessors • In-depth understanding of Network Rules, Platforms, and Application development • Familiarity with cloud-native, scalable services • Experience with common cybersecurity tools and technologies such as vulnerability & compliance scanners, anti-malware, code analyzers, IDS/IPS, DLP, SBOM, etc. • Experience building and maintaining Standard Operating Procedures • Obtain Security+ or other DoD 8570 IAT Level II or higher certification within 6 months of employment with Raft Highly preferred: • Bachelor's degree in Cybersecurity, Information Assurance, Information Technology, or a related field. • CISSP, CISM, CISA, CGRC, or other DoD 8570 IAM Level 2 or higher certifications • Experience in a K8s DevSecOps environment, preferably with Platform One • Experience with FIPS (Federal Information Processing Standards) • Experience with writing/reviewing RMF control policies • Experience with Executive leadership (PMO office) • Knowledge of Cloud platforms and migrations • Previous experience as a Solution Architect • Engineering background • Experience in a software factory setting Clearance Requirements: Active Secret with the ability to obtain and maintain a Top Secret security clearance Work Type: Onsite in Honolulu, HI May require up to 35% travel to both CONUS and OCONUS locations (Must possess a valid, active US passport with at least six months validity beyond intended period of employment to facilitate international travel and meet security requirements for government contracts.) Salary Range: $180,000 - $220,000 The determination of compensation is predicated upon a candidate's comprehensive experience, demonstrated skill, and proven abilities What we will offer you: Highly competitive salary Fully covered healthcare, dental, and vision coverage 401(k) and company match Take as you need PTO + 11 paid holidays Education & training benefits Generous Referral Bonuses And More! Our Vision Statement: We bridge the gap between humans and data through radical transparency and our obsession with the mission. Our Customer Obsession: We will approach every deliverable like it's a product. We will adopt a customer-obsessed mentality. As we grow, and our footprint becomes larger, teams and employees will treat each other not only as teammates but customers. We must live the customer-obsessed mindset, always. This will help us scale and it will translate to the interactions that our Rafters have with their clients and other product teams that they integrate with. Our culture will enable our success and set us apart from other companies. How do we get there? Public-sector modernization is critical for us to live in a better world. We, at Raft, want to innovate and solve complex problems. And, if we are successful, our generation and the ones that follow us will live in a delightful, efficient, and accessible world where out-of-box thinking, and collaboration is a norm. Raft's core philosophy is Ubuntu: I Am, Because We are. We support our "nadi" by elevating the other Rafters. We work as a hyper collaborative team where each team member brings a unique perspective, adding value that did not exist before. People make Raft special. We celebrate each other and our cognitive and cultural diversity. We are devoted to our practice of innovation and collaboration. We're an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status.
    $74k-95k yearly est. 1d ago
  • Information Security Risk Analyst

    American Savings Bank 4.5company rating

    Cyber security analyst job in Urban Honolulu, HI

    Job Description Primary Purpose of Job Supports the company's information security program to ensure that policies, procedures, standards and practices are in place to adequately identify, assess, mitigate, manage, monitor and report on key information security risks. Major Job Accountabilities Works with IT and internal operations to ensure safeguarding of all confidential, proprietary, privileged, and protected information assets, including customer data. Monitors essential processes to ensure compliance with policies, standards, practices, and guidelines. Assists in verifying compliance with information security requirements of applicable laws, regulations, and Bank policies and procedures, including but not limited to GLBA, FACTA, PCI DSS, Anti-Money Laundering laws and regulations, Bank Secrecy Act, and USA PATRIOT Act. Develops and performs information security and vulnerability assessments, including testing of applications, systems, and infrastructure to ensure appropriate protection of sensitive customer and company information. Conducts risk analyses and recommends remediation for deficiencies. Tracks and assesses remediation(s) to ensure compliance with policies and operational standards. Performs information security risk management activities including information security risk assessments, vendor risk reviews, and monitoring remediation of identified gaps and issues. Develops reports on key program effectiveness metrics, including analytics for actionable insights. Ensures technical enforcement and effectiveness of internal security controls to maintain integrity of organizational networks, systems, and applications. Develops and conducts bank-wide/departmental information security training. Maintains current knowledge of evolving information security risks, particularly regarding cyber security, trends with risk mitigation tools, and changes to industry regulations affecting financial institutions. Recommends, maintains, develops, and revises all information security governance documentation. Builds and matures a culture focused on the proactive awareness and improvement of the information security risk environment. May occasionally work evening/night hours as needed to address critical situations. Experience Required Minimum of four (4) years of the following experience: Direct experience in developing information security programs and assessing effectiveness of such programs, preferably within a financial services organization. Experience with risk management frameworks, internal controls, and risk concepts. Experience with information security frameworks and general areas of information security. Required Skills or Training Verified self-motivated learner bringing a sense of enthusiasm to a hands-on working environment, with the ability to independently research and develop solutions to unique challenges. Knowledge of risk management, business process design, and risk concepts with a background in financial, regulatory, information security, and/or enterprise risk management. Proven critical thinker with the ability to research, assess, and effectively communicate IT risks and develop, recommend, and monitor corresponding controls. Proven excellent interpersonal, verbal, and writing skills to clearly communicate to a diverse audience, with verified ability to build and maintain relationships across diverse technical and non-technical teams. Established acute analytical skills, including the ability to consolidate broad data sets from multiple sources, both internal and external, to identify patterns and/or risk factors. Verified knowledge and experience with a broad range of security frameworks and standards such as PCI, NIST, ISO 2700 series, etc. Knowledge of the SOX, Federal Financial Institutions Examination Council (FFIEC) and section 501(b) of the Gramm-Leach-Bliley Act. Ability to independently apply risk management concepts in various and novel situations to accurately identify, assess, and conclude on risks, while also determining alternatives or designing mitigating controls/activities. Knowledge and experience with several networking, operating systems, platforms, client/server, web applications, and general information security technologies is a plus. Knowledge and experience with General IT Controls (GITC) and maturity models from various frameworks (SOX, FFIEC, CIS, etc.) is a plus. EOE, including disability/veterans At American Savings Bank, we welcome and support all individuals and celebrate the diversity of our team members, customers and community. We are committed to ensuring that our online application process is accessible and provides an equal employment opportunity to all job seekers. If you need assistance searching for a job or submitting an application, please contact us by calling ************ and a member of our Recruitment team will follow up with you. Mahalo for your interest in American Savings Bank!
    $85k-111k yearly est. 29d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Urban Honolulu, HI

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 32d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Urban Honolulu, HI?

The average cyber security analyst in Urban Honolulu, HI earns between $65,000 and $106,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Urban Honolulu, HI

$83,000

What are the biggest employers of Cyber Security Analysts in Urban Honolulu, HI?

The biggest employers of Cyber Security Analysts in Urban Honolulu, HI are:
  1. TEKsystems
Job type you want
Full Time
Part Time
Internship
Temporary