Cyber security analyst jobs in Wake Forest, NC - 82 jobs
All
Cyber Security Analyst
Security Engineer
Information Security Engineer
Securities Analyst
Network Security Analyst
Senior Security Analyst
Cyber Security Engineer
Senior Information Security Engineer
Network Security Analyst
Collabera 4.5
Cyber security analyst job in Durham, NC
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
Collabera listed in GS 100 - recognized for excellence and maturity
Collabera named among the Top 500 Diversity Owned Businesses
Collabera listed in GS 100 & ranked among top 10 service providers
Collabera was ranked:
32 in the Top 100 Large Businesses in the U.S
18 in Top 500 Diversity Owned Businesses in the U.S
3 in the Top 100 Diversity Owned Businesses in New Jersey
3 in the Top 100 Privately-held Businesses in New Jersey
66th on FinTech 100
35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Work Location: Durham NC 27703
Job Title: Network SecurityAnalyst
Duration: 24 Months
Roles & Responsibilities:
• Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis.
• Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired.
• The Operations team supports 24x7 and an off shift work schedule may be required.
Qualifications
IDS/IPS
"Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer"
Additional Information
Should you have any questions, please feel free to call:
************
Aditika Sithta
$75k-101k yearly est. 1d ago
Looking for a job?
Let Zippia find it for you.
Product Security Engineer, Instagram
Meta 4.8
Cyber security analyst job in Raleigh, NC
The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform.
**Required Skills:**
Product Security Engineer, Instagram Responsibilities:
1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products
2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code
3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities
4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage
5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
**Minimum Qualifications:**
Minimum Qualifications:
7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience
8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP)
9. Extensive, proven experience in threat modeling and secure systems design
10. Experience with exploiting common security vulnerabilities
**Preferred Qualifications:**
Preferred Qualifications:
11. Product software engineering or product management experience
12. Experience in security consulting or other leadership-facing security advisory roles
13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response
14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.)
**Public Compensation:**
$184,000/year to $257,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
$184k-257k yearly 60d+ ago
Cyber Security Engineer (Splunk)
ZP Group 4.0
Cyber security analyst job in Raleigh, NC
Piper Companies is seeking a CyberSecurity Engineer (Splunk) for a world leading technology firm in the Raleigh, NC area. The CyberSecurity Engineer (Splunk) will join a world class security organization with a highly skilled team responsible for designing, developing, and managing the security services within the organization. An ideal candidate for the CyberSecurity Engineer (Splunk) will be action oriented and a strong problem solver.
Responsibilities for the CyberSecurity Engineer (Splunk) include:
* Manage multiple SPLUNK environments and create SPLUNK queries and dashboards as needed
* Perform penetration testing, vulnerability scanning, IR, and network security configurations
* Research, analyze, and help make decisions on new security tools and technologies
* Develop tools and automation utilizing python scripts
Requirements for the Senior CyberSecurity Engineer (Splunk) include:
* Active Secret Security Clearance
* Over 5 years of cybersecurity engineering experience
* Experience with Splunk - configuration, management, and querying skills
* Prior experience migrating Splunk on prem to Splunk cloud
* Experience in penetration testing, vulnerability scanning, IR, and overall network security
* Python scripting experience
* Strong verbal and written communication skills
Compensation of the Senior CyberSecurity Engineer (Splunk) includes:
* $115,000 - $140,000 annually with a full comprehensive benefits including Medical, Dental, Vision, 401K, PTO, Sick Leave as required by law
* Must be eligible to work in the United States
This job opens for applications on July 30, 2025. Applications for this job will be accepted for at least 30 days from the posting date.
Keywords: Splunk, Security Engineer
#LI-JA1
#LI-HYBRID
$81k-110k yearly est. 60d+ ago
Information Security Engineer
Element Solutions Inc.
Cyber security analyst job in Apex, NC
Challenge Yourself and Impact the Future! Element Solutions Inc (NYSE:ESI) is a leading specialty chemicals company whose operating businesses formulate a broad range of solutions that enhance the performance of products people use every day. Developed in multi-step technological processes, our innovative solutions enable our customer manufacturing processes in several key segments, including electronic circuitry, communication infrastructure, automotive systems, industrial surface finishing, and offshore energy.
Customers of our businesses use our innovation as a competitive advantage, relying on us to help them navigate in fast-paced, high-growth markets. For example, in-care technology, from infotainment to driver assistance, is accelerating the paste of new product development and automotive markets, and with a deep market expertise in electronics, we sit at the intersection of the fast-growing market, changing the competitive playing field for automotive manufacturers, with a long-standing presence.
We strive to embody the five 'Elements of our Culture'- our '5C's'; Challenge, Commit, Collaborate, Choose, and Care. These core values are the foundation of our organization which our employees embrace in their interactions with customers, colleagues and other stakeholders, to drive financial performance and create a rewarding work environment.
Who are we looking for?
The Senior Information Security Engineer is a critical member of the security operations team, responsible for protecting the organization's infrastructure through advanced security engineering practices. This role focuses on vulnerability management, network security, endpoint protection, and secure access technologies, ensuring a proactive and resilient security posture across all environments.
What will you be doing?
* Lead the enterprise vulnerability management program, including but not limited to:
* Scanning, analysis, prioritization, and remediation tracking.
* Perform regular vulnerability assessments using tools such as Tenable, Qualys, or Rapid7, and collaborate with stakeholders to address findings.
* Stay informed on emerging threats, vulnerabilities, and technologies relevant to network, endpoint, and access security.
* Develop and maintain security metrics and dashboards to track vulnerability trends, network health, and endpoint protection status.
* Network Security
* Design, implement, and manage network security controls including firewalls, VPNs, IDS/IPS, and segmentation strategies.
* Deploy and manage secure access technologies such as Zscaler or Cato Networks to enforce zero trust principles and protect remote connectivity.
* Monitor and analyze network traffic for signs of malicious activity or policy violations.
* Endpoint Security
* Engineer and maintain endpoint security solutions, with hands-on experience in EDR platforms such as CrowdStrike, SentinelOne, or Microsoft Defender for Endpoint.
* Collaboration
* Collaborate with infrastructure and application teams to ensure secure network and endpoint configurations.
* Assist in incident response activities related to network, endpoint, or access-related threats.
* Contribute to the development and enforcement of security policies, standards, and procedures.
* Mentor junior engineers and contribute to continuous improvement of security operations and architecture.
Who are You?
* Bachelor's degree in Cybersecurity, Computer Science, or related field.
* 5+ years of experience in information security engineering, with strong expertise in vulnerability management, network security, and endpoint protection.
* Hands-on experience with vulnerability scanning tools (e.g., Tenable, Qualys, Rapid7).
* Familiarity with CVSS scoring, patch management processes, and remediation workflows.
* Deep understanding of network protocols, architectures, and security technologies (e.g., firewalls, IDS/IPS, VPNs).
Preferred but not required:
* Experience working in a global organization
* Chemical and/or manufacturing industry experience
* Industry certifications such as CISSP, CEH, OSCP, GIAC, or CCSP are highly desirable.
* Proven experience with EDR platforms such as CrowdStrike, SentinelOne, or similar.
* Experience with secure access technologies such as Zscaler or Cato Networks.
* Experience with cloud platforms (AWS, Azure, GCP) and hybrid environments.
We understand that not all candidates may meet the requirements listed above. If you believe you have the knowledge and experience necessary to excel in this role, we encourage you to apply.
What competencies will you need?
* Strong analytical and problem-solving skills.
* Ability to communicate technical concepts clearly to both technical and non-technical audiences.
* Proactive and detail-oriented with a strong sense of ownership.
* Excellent organizational and project management abilities.
* Ability to work independently and collaboratively in a dynamic environment.
We are Offering...
As part of our team here, as well as receiving a competitive base salary, you will also participate in a generous performance related bonus plan. In addition, you will also receive a 401k plan with company matching, Life Insurance, and Medical Insurance as well as 9 holidays.
The typical base salary range for this position is anticipated to be between $124,587 and $186,881.
Innovative - At ESI, we are committed to solving the complex and evolving needs of our customers through innovation and high-quality standards. We are focused on bringing cutting edge and environmentally sustainable solutions to the market. Our people are the critical resource required to make that happen. We support your success by creating a strong, inclusive culture, competitive total rewards, and an appropriate work-life balance.
Socially Responsible - We care about what you care about. We respect the individual differences that make up our unique expanding organization. We prioritize both sustainability and social impact in both our business operations and our local communities through our various ESI Cares initiatives and the ESI Foundation. There are many ways to get involved from employee network groups that support your interests and sense of belonging to paid volunteer days.
#LI-SB1
Equal Opportunity Employer
All qualified applications will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, status as a protected veteran, or any other protected category applicable under federal, state and local laws.
Nearest Major Market: Raleigh
$124.6k-186.9k yearly 30d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Raleigh, NC
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d+ ago
Security Analyst
Maintainx 3.4
Cyber security analyst job in Raleigh, NC
MaintainX is the world's leading Asset and Work Intelligence platform for industrial and frontline environments. We are a modern IoT-enabled cloud-based tool for reliability, safety, and operations on physical equipment and facilities. MaintainX powers operational excellence for 12,000+ businesses including Duracell, Univar Solutions Inc., Titan America, McDonald's, Brenntag, Cintas, Xylem, and Shell.
We recently completed a $150 million Series D round, bringing our total funding to $254 million and valuing the company at $2.5 billion.
We're looking for a SecurityAnalyst to support our security program across both regulated (FedRAMP) and non-regulated environments. This role focuses on security operations, vulnerability management, and compliance support. You will work with tools like Datadog, Wiz, and AWS to protect our infrastructure and data across multiple environments.
This role is hybrid out of our Raleigh or Montreal office.
What you'll do:
* Monitor and triage security alerts using tools like Datadog, SIEM platforms, and other security monitoring solutions.
* Manage vulnerability assessment programs, tracking remediation efforts across cloud and on-premise infrastructure.
* Conduct security control assessments and prepare technical documentation and evidence for audits.
* Support penetration testing initiatives and security assessments on internal products and infrastructure.
* Investigate security incidents, document findings, and support incident response activities.
* Collaborate with DevOps, IT, Product, and other teams to implement and verify security controls.
* Develop tooling for the security team
* Participate in internal and external audits across multiple compliance frameworks (FedRAMP, SOC 2, ISO 27001, etc.).
* Contribute to security policy development, documentation, and awareness training initiatives.
* Stay current with emerging threats, security best practices, and compliance requirements.
About you:
* Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent experience).
* 2-4 years of experience in information security, security operations, or related roles.
* Hands-on experience with cloud security (mainly AWS) and cloud-native security tools.
* Familiarity with security frameworks such as NIST 800-53, SOC 2, ISO 27001, or FedRAMP.
* Experience with vulnerability management tools and processes.
* Understanding of security monitoring, log analysis, and incident response.
* Strong analytical and problem-solving skills with attention to detail.
* Excellent written and verbal communication skills.
* Ability to work independently and collaboratively in a fast-paced environment.
Bonus if you have:
* Experience with security tools such as Wiz, Datadog, Jira, vulnerability scanners, password managers, EDRs and SIEM platforms.
* Previous experience supporting compliance programs (FedRAMP, SOC 2, ISO 27001, etc.).
* Security certifications such as Security+, GSEC, OSCP, CISSP, or equivalent.
* Experience with penetration testing methodologies and tools.
* Knowledge of DevSecOps practices and security automation.
* Scripting or programming experience (typescript, dot net) for security automation.
What's in it for you:
* Competitive salary and meaningful equity opportunities.
* Healthcare, dental, and vision coverage.
* 401(k) / RRSP enrolment program.
* Take what you need PTO.
* A Work Culture where:
* You'll work alongside folks across the globe that reflect the MaintainX values, Smart Humble Optimist.
* We believe in meritocracy, where ideas and effort are publicly celebrated.
About us:
Our mission is to make the life of blue-collar workers easier worldwide by creating software that meets their needs and realities. Our product is truly life-changing for 80% of the workforce that doesn't work behind a desk and needs enterprise-grade software at their fingertips.
MaintainX is committed to creating a diverse environment. All qualified applicants will receive consideration for employment without regard to race, colour, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status.
$70k-103k yearly est. Auto-Apply 7d ago
Sr. Security Analyst
Procom Consultants Group 4.2
Cyber security analyst job in Durham, NC
Procom is a leading provider of professional IT services and staffing to businesses and governments in Canada. With revenues over $500 million, the Branham Group has recognized Procom as the 3rd largest professional services firm in Canada and is now the largest “Canadian-Owned” IT staffing/consulting company.
Procom's areas of staffing expertise include:
• Application Development
• Project Management
• Quality Assurance
• Business/Systems Analysis
• Datawarehouse & Business Intelligence
• Infrastructure & Network Services
• Risk Management & Compliance
• Business Continuity & Disaster Recovery
• Security & Privacy
Specialties• Contract Staffing (Staff Augmentation)
• Permanent Placement (Staff Augmentation)
• ICAP (Contractor Payroll)
• Flextrack (Vendor Management System)
Job Description
Sr. SecurityAnalyst
On behalf of our client, Procom Services is searching for a Sr. SecurityAnalyst for a contract opportunity in Durham, NC.
Sr. SecurityAnalyst Job Details
Responsible for user account administration in a multi-platform environment and ensure that administration procedures are aligned with overall Information Security policies and standards. Assist in the development of access controls to safeguard customer systems against accidental or unauthorized modification, destruction or disclosure.
Maintain user access to securable customer system resources (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange) performing tasks such as: creation / configuration of user logon Ids and updating access control lists, access provisioning and access removals and access terminations.
Perform detailed analysis of access requests/processes and provide recommendations for improvement to senior team members and Information Security management.
Educate information / resource owners in the implementation of necessary information security controls.
Perform standard and non-standard processing of security authorization requests.
Work with resource owners to determine appropriate security policies for securable customer resources.
Provide on-call support for after-hours system access issues and troubleshoot system access problems and failures.
Report suspected information security misuse to manager or director.
Assist resource owners and IT staff in understanding and responding to security access exceptions.
Sr. SecurityAnalyst Mandatory Skills
- Bachelor's degree in Computer Science.
- 2 years of security administration experience, or related technical system administration experience.
- In lieu of degree 5 years of security administration experience.
- Familiarity with audit and risk-related methodologies; such as COBIT and HIPAA.
- Systems administration experience within other aspects of IT
- Demonstrated security administration experience on two or more platforms (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange)
- Demonstrated experience working with a managed services organization.
- Demonstrated experience working with a request ticketing system, such as Triole.
- Strong analytical and problem-solving skills.
- Ability to present and discuss technical information to users with varying technical expertise.
- Proven ability to work under stress in emergencies. Flexibility to handle pressure from many directions simultaneously.
- Must be detail-oriented with a high level of accuracy.
- Excellent written and verbal communication skills.
- Demonstrated ability to develop and maintain collaborative working relationships across multiple teams.
- Strong customer focus and the ability to manage customer expectations.
- Must have strong team-oriented interpersonal skills and the ability to effectively interface with a wide variety of people.
- Demonstrated commitment to continuous process improvement.
- CISSP, CISA, or other security / audit / field related certifications a plus
Sr. SecurityAnalyst Start Date
ASAP
Sr. SecurityAnalyst Assignment Length
7+ months
Additional Information
All your information will be kept confidential according to EEO guidelines. Please send your resume in
Word
format only.
$75k-95k yearly est. 1d ago
Lead Information Security Architect / Engineer
Pathwayrp
Cyber security analyst job in Durham, NC
EmTacq specializes in EMployer Talent ACQuisitions, matching the most qualified candidates with the most competitive positions available. We pride ourselves on not just putting bodies in seats, rather matching professionals to their careers. We are headquartered in the Raleigh / Durham, NC area. However, as a recruiting agency we service companies and candidates across the United States. We are your best source for professional, value driven low cost recruitment services.
Job Description
The Lead Information Security Engineer will be responsible for designing and implementing a process to analyze the design of technology solutions for threats, attacks, and vulnerabilities that could affect the control environment. Must be a subject matter expert (SME) with strong collaboration skills to work with cross functional teams to ensure the design of technology solutions complies with information security policies, and regulatory obligations.
The Lead Information Security Engineer must have the ability to identify, document, and recommend security safeguards and configurations in a highly complex environment with a demonstrated ability to recognize, and appropriately incorporate layered security safeguards within the network, application, and data layers from a defender's perspective. In this role you must be a positive professional, adaptable, pragmatic, and who is comfortable in delivering clear and concise information at both a technical and managerial level.
Responsibilities:
Design and implement a process to analyze the design of technology solutions for threats, attacks, and vulnerabilities that could affect the client's control environment. Review and approve security configuration checklists (e.g., hardening or lockdown guides) for technology platforms and solutions (e.g., operating systems, databases, firewalls, etc.) Provide security consulting services internally to the engineering organization by giving guidance and functioning as an information security SME. Must have the ability to identify, document, and recommend security safeguards and configurations in a highly complex environment with a demonstrated ability to recognize, and appropriately incorporate layered security safeguards within the network, application, and data layers from a defender's perspective.
Qualifications
Required Experience
*5+ years of experience in one or more of the following information security domains: access management, cryptography, data loss prevention (DLP), emerging technologies (i.e., cloud, mobile, etc.), endpoint security, incident response, malware analysis and protection, network and perimeter security, or web and mobile application security.
*5+ years of experience analyzing the design of technology solutions using common industry frameworks such as DREAD, SSE-CMM (ISO/IEC 21827), STRIDE, or other risk assessment models.
*5+ years of working knowledge of various industry security standards and frameworks including: ISO 27001, ISF Standard of Good Practice (SoGP), NIST Special Publications, etc.
*5+ years of working knowledge of modern enterprise and security architectures, their challenges, common approaches to overcome their challenges, and their inherent security strengths and weaknesses.
*Teamwork and communication skills, both written and verbal.
Preferred Experience
*Bachelor's degree in Computer Science, Information Systems, or related field. 8+ years of equivalent work experience required in lieu of degree is acceptable.
*Professional certifications such as: CISSP, CISA, CISM, GIAC, CGEIT, CRISC, CEH, or other relevant industry certification strongly preferred.
Additional Information
Equal Employment Opportunity
Our client is proud to be an equal opportunity/affirmative action employer. We are committed to attracting, retaining and maximizing the performance of a diverse and inclusive workforce. It is their policy to ensure equal employment opportunity without discrimination or harassment on the basis of race, color, creed, religion, national origin, alienage or citizenship status, age, sex, sexual orientation, gender identity or expression, marital or domestic/civil partnership status, disability, veteran status, genetic information or any other basis protected by law.
$77k-104k yearly est. 1d ago
Junior Security Analyst - 3rd Shift
Varonis 4.2
Cyber security analyst job in Morrisville, NC
Description Junior SecurityAnalyst- 3rd Shift The Company: Varonis (Nasdaq: VRNS) is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. Thousands of organizations worldwide trust Varonis to defend their data wherever it lives - across SaaS, IaaS, and hybrid cloud environments. Customers use Varonis to automate a wide range of security outcomes, including data security posture management (DSPM), data classification, data access governance (DAG), data detection and response (DDR), data loss prevention (DLP), and insider risk management. Varonis protects data first, not last. Learn more at **************** The Role: We are seeking a driven MDDR SecurityAnalyst to join the forefront of our data security mission- working 24x7 to monitor, triage, investigate, and escalate incidents where data is at risk and to ensure we meet operational SLAs. Data is the #1 target of attackers, and Varonis' Managed Data Detection and Response (MDDR) customers entrust our team with the security of their data. They will develop a deep understanding of the Varonis platform and related technologies. This role demands knowledge of security ecosystems (ex. SIEM, SOAR, ITSM, EDR, IPS/IDS, Active Directory, DNS, IAM/PAM, etc.) and enterprise security operations. The Location: We are considering candidates who are located within physical proximity to Raleigh, North Carolina. The Requirements:
1-3 years of experience in cybersecurity
Degree or certification(s) in cybersecurity and/or proven ability to execute across cybersecurity operations disciplines, including monitoring, detection, investigation, and incident response.
Proven success in contributing to a team-oriented environment.
Strong analytical and creative problem-solving skills.
Excellent communication skills (written and oral) and interpersonal skills (colleagues and customers).
Attention to detail and the capability to deliver outcomes autonomously.
Knowledge of common security technologies and tools including network-based (firewall and IDS), host-based (EDR and AV), data-based (DLP and DSPM), and identity-based (PAM and IAM), gained through experience or study.
Knowledge of operational information security disciplines including alert monitoring, threat detection, incident response, security infrastructure management, and system and architecture hardening, gained through experience or study.
Demonstrated ability to learn new skills and technologies swiftly.
Proficiency in critical thinking and problem-solving for complex issues.
The Responsibilities:
Monitor and respond to detections within the Varonis platform.
Conduct thorough triage of Varonis detections through critical analysis and investigative methodologies.
Validate findings and coordinate investigative and response efforts with customers and internal teams.
Document and communicate investigative findings effectively, including tracking in CRM and related systems.
Assist in the development, documentation, analysis, testing, and modification of Varonis' threat detection systems, playbooks, and runbooks.
Logistics:
Shifted Schedule: Sunday to Wednesday, or Wednesday to Saturday.
12-hour shifts with one 1-hour break and two 30-minute breaks.
Night shift (9pm to 9am EST).
6 weeks of dedicated new hire training.
MDDR SecurityAnalysts are expected to complete Sec+ and CySA+ training within their first year.
Work visa sponsorship is not available.
We invite you to check out our Instagram Page to gain further insight into the Varonis culture!
@VaronisLife
Varonis is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, national origin, disability, veteran status, and other legally protected characteristics
$82k-107k yearly est. Auto-Apply 60d+ ago
AI Security Engineer
Tanium 3.8
Cyber security analyst job in Durham, NC
The basics
Tanium is seeking an AI Security Engineer to lead the development and execution of comprehensive testing strategies that ensure the robustness and reliability of AI-driven solutions. The AI security Engineer will be an integral part of the R&D organization and collaborate closely with AI, Software, and Security Engineers. This role is crucial in evaluating AI models, identifying potential risks, and implementing safety measures that align with industry standards and regulatory requirements.
A successful candidate will be a strong technical leader who can bring their industry expertise to drive vision and development cross-functionally across all levels of the organization. Must have a successful track record of doing safety testing and evaluating AI models.
This is an individual contributor role.
What you'll do
Develop and execute AI benchmarking and safety testing strategies for various AI models and applications.
Design and implement testing protocols to assess the performance, accuracy, and safety of AI solutions.
Identify potential risks associated with AI technologies and propose mitigation strategies.
Collaborate with cross-functional teams to integrate safety measures into AI development processes.
Analyze testing results and provide detailed reports on AI model performance and safety.
Stay current with industry standards, regulatory requirements, and best practices for AI safety testing.
Drive continuous improvement in AI safety testing methodologies and tools.
We're looking for someone with
Education
Bachelor's degree in computer science, Engineering, or related field.
Experience
8+ years of relevant work experience.
Expertise with common security testing methodologies.
Experience with regulatory compliance and industry standards for AI safety.
Familiarity with AI development frameworks and tools.
Strong understanding of AI and machine learning algorithms and their associated risks.
Experience with LLMs, AI Agents, and Natural Language Processing (NLP) techniques, with a focus on safety testing and benchmarking.
Other
Strong analytical and problem-solving skills. Excellent communication and collaboration abilities.
Detailed oriented individual with a deep drive to research the security of bleeding edge technology.
About Tanium
Tanium delivers the industry's only true real-time cloud-based endpoint management and security offering. Its platform is real-time, seamless, and autonomous, allowing security-conscious organizations to break down silos between IT and Security operations that results in reduced complexity, cost, and risk. Securing more than 32M endpoints around the world, Tanium's customers include Fortune 100 organizations, top US retailers, top US commercial banks, and branches of the U.S. Military. It also partners with the world's biggest technology companies, system integrators, and managed service providers to help customers realize the full potential of their IT investments. Tanium has been named to the Forbes Cloud 100 list for nine consecutive years and ranks on the Fortune 100 Best Companies to Work For. For more information on The Power of Certainty™, visit ************** and follow us on LinkedIn and X.
On a mission. Together.
At Tanium, we are stewards of a culture that emphasizes the importance of collaboration, respect, and diversity. In our pursuit of revolutionizing the way some of the largest enterprises and governments in the world solve their most difficult IT challenges, we are strengthened by our unique perspectives and by our collective actions.
We are an organization with stakeholders around the world and it's imperative that the diversity of our customers and communities is reflected internally in our team members. We strive to create a diverse and inclusive environment where everyone feels they have opportunities to succeed and grow because we know that only together can we do great things.
Each of our team members has 5 days set aside as volunteer time off (VTO) to contribute to the communities they live in and give back to the causes they care about most.
What you'll get
The annual base salary range for this full-time position is $120,000 to $355,000. This range is an estimate for what Tanium will pay a new hire. The actual annual base salary offered may be adjusted based on a variety of factors, including but not limited to, location, education, skills, training, and experience.
In addition to an annual base salary, team members will receive equity awards and a generous benefits package consisting of medical, dental and vision plan, family planning benefits, health savings account, flexible spending account, transportation savings account, 401(k) retirement savings plan with company match, life, accident and disability coverage, business travel accident insurance, employee assistance programs, disability insurance, and other well-being benefits.
For more information on how Tanium processes your personal data, please see our Privacy Policy.
$86k-119k yearly est. Auto-Apply 14d ago
Security Engineer, Level III
Corporate & Technical Recruiters, Inc.
Cyber security analyst job in Durham, NC
This individual will be responsible for providing tier III support for a Managed Service Security Provider (MSSP). The successful candidate will be an integral member of the security engineering team and will need to be fully cognizant of state-of-the-art network, firewall, and other security technologies, products and solutions as well as industry best practice with regard to the design, implementation and deployment of next generations security devices.
This individual should have hands-on experience configuring, installing and managing Fortigate, Cisco ASA, Checkpoint, SonicWall or Blue Coat security devices. This person must be able to communicate, and document instructions effectively with Tier 1 and 2 support teams. Excellent customer service skills and written communication are required.
This position is located in Durham, NC.
Qualifications:
A Bachelors or Master's degree preferably in Computer Engineering/Networking, international equivalent, or equivalent experience
Minimum of 5 years of experience designing, implementing and deploying next generation firewalls based on Information Security Best Practices
Hands on experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc
Minimum of 7 years experience in networking, troubleshooting, and analysis tools
Expert understanding and working knowledge of TCP/IP, access-control lists, VLANs, VPNs, firewalls, and dynamic routing protocols such as BGP, OSPF and EIGRP
Evaluates and recommends solutions for highly complex security systems according to industry best practices to safeguard internal information systems and databases
Excellent communication skills and experience working collaboratively in cross-functional teams.
On-call Duties
Ability to travel as needed, approximately 1-3 times a quarter. Can be both domestic and global travel.
Desired:
Vender Certification, preferably Fortinet/Cisco/Blue Coat
Security Certifications: CCNA, CCNP-Security
The ability to define security requirements and subsequently reviews complex systems to determine if they have been designed to comply with established standards
The ability to conduct research and inform management of appropriate developments in firewall, IDPS, WCF, DLP, Application Control and VPN and secure networking technologies and products
Compensation:
A competitive package consisting of a base salary, and full company benefits
Company information
We help nations, governments and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and transform their operations. We do this using our unique set of solutions, systems, experience and processes - often collecting and analyzing huge volumes of data. We employ over 4,000 people across 18 countries in the Americas, APAC, UK and EMEA
$80k-111k yearly est. 60d+ ago
Security Engineer II
Insight Global
Cyber security analyst job in Raleigh, NC
Support Continuous Monitoring activities for FedRAMP and other compliance functions (NIST 800-53, ISO 27001, SOC audits) - Monitor and assess daily vulnerability reports for FedRAMP-authorized systems
- Identify, track, and report emerging threats and vulnerabilities
- Coordinate with internal teams for timely remediation
- Ensure timely submission of FedRAMP Continuous Monitoring documentation
- Liaise with internal/external auditors for FedRAMP audit support
- Monitor regulatory updates and integrate changes into monitoring processes
- Collaborate across teams to reduce risk and improve compliance
- Vulnerability Management
· Tools: Qualys, Tenable, or other (plus, procurement experience)
· Critical for FedRAMP
· Assess current state of vulnerabilities
- Compliance
· Operate compliant
· Collect evidence for audits (grant work)
· Continuous monitoring
- Collaboration
· Work with internal/external teams across company
· Federal VR sponsor involvement
- All other duties as assigned
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
Tools: Qualys, or Tenable, or other
- Experience in control assessment, third-party risk, and/or cybersecurity
- Foundational knowledge of security frameworks (FedRAMP, ISO27k, NIST, etc.)
- Proven experience in vulnerability management (identification, assessment, tracking, remediation)
- Hands-on experience with vulnerability scanners and SIEM platforms
- Experience with security automation using scripting languages
- Excellent problem-solving skills
- Ability to work independently or collaboratively in a fast-paced environment
- Strong verbal and written communication skills
- Ability to monitor security systems for threats
- Installation/troubleshooting in web-based environments
- Self-motivated
- Can track technical issues - Proficiency in Microsoft Power Automate (building, maintaining, troubleshooting workflows)
- Engineering background
- Ability to understand vulnerability management within the context of security frameworks
$80k-111k yearly est. 11d ago
Sr. Information Security Engineer
Bandwidth 4.5
Cyber security analyst job in Raleigh, NC
Who We Are:
Bandwidth, a prior “Best of EC” award winner, is a global software company that helps enterprises deliver exceptional experiences through voice, messaging, and emergency services. Reaching 65+ countries and over 90 percent of the global economy, we're the only provider offering an owned communications cloud that delivers advanced automation, AI integrations, global reach, and premium human support. Bandwidth is trusted for mission-critical communications by the Global 2000, hyperscalers, and SaaS builders!
At Bandwidth, your music matters when you are part of the BAND. We celebrate differences and encourage BANDmates to be their authentic selves. #jointheband
What We Are Looking For:
The mission of the Security Operations team is to build, deploy, and operate information security systems, infrastructure, and tools. The Senior Security Engineer will act as a leader in monitoring, administration, ticketing and support. In addition, mentoring other security team members in operations functions, as well as assisting management in growing and maturing security detection, monitoring and response. As a Senior Security Engineer, you will work closely with not only other Information Security teams but also partner with the IT, development and architecture organizations. You will be part of a talented team of security professionals who demonstrate superb technical competency, delivering mission critical infrastructure and ensuring the highest levels of availability, performance and security across the enterprise.
What You'll Do:
Provide technical and operational leadership for aspects of security operations, security architecture and security tools administration.
Serve as an escalation point in incident response scenarios; acting as the incident lead and conducting investigations and forensics as needed.
Actively engages in the performance of Incident Response activities, including but not limited to, triage, escalation, conducting post-mortem and lessons learned, as well as remediation tracking.
Displays a strong knowledge and understanding of the utilization of various security tools include SIEM, SOAR, vulnerability scanners, CSPM, and EDR
Advanced understanding of securing both cloud-based (AWS, GCP) and on-prem workloads including traditional architecture design and containerized environments.
Identify gaps in current monitoring or operational processes and workflows, and recommend changes or enhancements to improve efficiency through security best practices..
Provide security consulting on medium to large scale projects for internal clients to ensure conformity with corporate information, security policy and standards
Drive vulnerability management and remediation efforts - prioritizing issues, implementing mitigations, and designing strategic preventative and compensating controls
Drives process improvement and control implementation projects in coordination with the other Enterprise teams
Engages with neighboring Bandwidth technology teams to drive awareness and compliance to security policies and standards
Participate in security on-call rotation, supporting off-hours general security incidents and production systems.
Maintain working relationships with business partners to understand business processes, and the impact of implementing security controls in their ability to do business
Train and mentor team members for security operations, support, and/or administration tasks
What You Need:
Education:
Degree in an IT or Information Security discipline or other equivalent combination of education and/or experience that is focused on IT Security and Technology Operations.
One or more of the following certifications:
GIAC Information Security Professional (GISP)
Certified Information Systems Security Professional (CISSP)
AWS Certified Security Specialty
Experience:
5 or more years of specific Security Operations experience required.
5 or more years SIEM, SOAR and vulnerability management experience, including integrating endpoints
3 or more years of incident response experience across a variety of environments and resource types: on-prem, cloud, endpoints, servers, containers, etc.
Knowledge:
Familiarity with cutting-edge security technologies such as Zero-Trust Network Access, SSO, Endpoint Detection and Response (EDR), and Security Incident and Event Management required (SIEM).
Experience working in multi-cloud organizations utilizing cloud security posture management (CSPM) and cloud-native security tools with a “shift-left” DevSecOps mentality
Experience working with a third-party Managed Security Service Provider (MSSP)
Skills:
Proficient in Windows and Linux operating systems.
Ability to analyze a complex technical environment and quickly build a conceptual understanding of how the pieces all fit together
Proficient in automation and scripting languages (Python, Bash, etc)
Ability to analyze and correlate information from multiple sources to determine and articulate potential risk to the business in non-technical terms.
Team player with strong communication skills, ability to collaborate with highly technical colleagues and non-technical end-users at a level they can understand.
Bonus Points:
Experience:
Hands-on experience with Wiz and CrowdStrike - cloud security and container security .
Hands-on experience with AWS / cloud security tools (Guard Duty, Amazon Inspector, AWS Shield,Wiz, Lacework, etc.)
Strong knowledge of SIEM tools and logging (Splunk, Sumo Logic, Data Dog, Qualys)
Understanding of maintaining and administering endpoint detection response tools (CrowdStrike, FireEye, etc)
Foundational knowledge of Ai - LLMs (language learning models), MCP (model context protocol) and the impacts of these on securing organizational resources.
Knowledge:
Understanding of authentication and authorization mechanisms.
Familiar with data classification, data protection, and secure data handling practices.
Understanding of regulatory requirements (SOX, GDPR, HIPAA … )
The Whole Person Promise:
At Bandwidth, we're pretty proud of our corporate culture, which is rooted in our “Whole Person Promise.” We promise all employees that they can have meaningful work AND a full life, and we provide a work environment geared toward enriching your body, mind, and spirit. How do we do that? Well…
100% company-paid Medical, Vision, & Dental coverage for you and your family with low deductibles and low out-of-pocket expenses.
All new hires receive four weeks of PTO.
PTO Embargo. When you take time off (of any kind!) you're embargoed from working. Bandmates and managers are not allowed to interrupt your PTO - not even with email.
Additional PTO can be earned throughout the year through volunteer hours and Bandwidth challenges.
“Mahalo moments” program grants additional time off for life's most important moments like graduations, buying a first home, getting married, wedding anniversaries (every five years), and the birth of a grandchild.
90-Minute Workout Lunches and unlimited meetings with our very own nutritionist.
Are you excited about the position and its responsibilities, but not sure if you're 100% qualified? Do you feel you can work to help us crush the mission? If you answered ‘yes' to both of these questions, we encourage you to apply! You won't want to miss the opportunity to be a part of the BAND.
Applicant Privacy Notice
$93k-119k yearly est. Auto-Apply 31d ago
Security Analyst
Computer World Services 3.9
Cyber security analyst job in Morrisville, NC
Job DescriptionComputer World Services Corp (CWS) is seeking an experienced SecurityAnalyst/Data Security Specialist to support the planning, coordination, and implementation of the organization's information security programs. This role involves maintaining and enhancing the security infrastructure, including firewalls, IDS/IPS, log aggregation, and file integrity monitoring systems, while addressing potential threats and vulnerabilities. The ideal candidate will possess a strong understanding of security practices, tools, and protocols and work closely with teams to investigate and resolve data security issues.Key Tasks & Responsibilities
Security Infrastructure Management:
Administer and manage firewall systems, intrusion detection and prevention systems (IDS/IPS), log aggregation systems, web traffic filtering appliances, and file integrity monitoring applications.
Design, implement, and monitor security measures for LAN/WAN environments to safeguard information systems.
Threat Monitoring and Incident Response:
Investigate alerts from Data Loss Prevention (DLP) agents and support the resolution of DLP rule problems.
Monitor systems for potential threats and respond promptly to security incidents.
Security Program Support:
Facilitate the identification of current security infrastructure and define requirements for future programs.
Collaborate with teams to implement encryption techniques and deploy security tools effectively.
Technical Expertise:
Evaluate and recommend commercial products and technologies for security solutions.
Maintain a working knowledge of hardware/software firewalls, communication protocols, and security tools.
Documentation and Compliance:
Document security incidents, system configurations, and process changes.
Ensure compliance with organizational and industry security standards and best practices.
Education & Experience
Education:
Bachelor's degree in Computer Science, Information Technology Management, or Engineering.
Alternatively, four years of related experience may substitute for the educational requirement.
Experience:
5-7 years of experience in information security, network security, or related fields.
Technical Skills:
Proficient in administering firewall systems, IDS/IPS, and DLP solutions.
Strong understanding of communication protocols, encryption techniques, and security tools.
Familiarity with log aggregation systems, web traffic filtering appliances, and file integrity monitoring applications.
Soft Skills:
Strong analytical and problem-solving skills.
Excellent verbal and written communication abilities.
Ability to work collaboratively in a team and adapt to rapidly changing security landscapes.
Preferred Qualifications:
Relevant certifications such as CISSP, CISM, CompTIA Security+, or CEH.
Hands-on experience with SIEM platforms and advanced threat detection tools.
Knowledge of security frameworks such as NIST, ISO 27001, or CIS Controls.
Certifications
Relevant certifications such as CISSP, CISM, CompTIA Security+, or CEH.
ITIL certification v4 preferred.
Security Clearance
Applicants must be eligible to obtain Public Trust clearance.
Other (Travel, Work Environment, DoD 8570 Requirements, Administrative Notes, etc.)
Potential hybrid work available for this position.
Computer World Services is an affirmative action and equal employment opportunity employer. Current employees and/or qualified applicants will receive consideration for employment without regard to race, color, religion, sex, disability, age, sexual orientation, gender identity, national origin, disability, protected veteran status, genetic information or any other characteristic protected by local, state, or federal laws, rules, or regulations.Computer World Services is committed to the full inclusion of all qualified individuals. As part of this commitment, Computer World Services will ensure that individuals with disabilities (IWD) are provided reasonable accommodations. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact Human Resources at ***********.
$71k-93k yearly est. Auto-Apply 49d ago
Network Security Analyst
Collabera 4.5
Cyber security analyst job in Durham, NC
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
Collabera listed in GS 100 - recognized for excellence and maturity
Collabera named among the Top 500 Diversity Owned Businesses
Collabera listed in GS 100 & ranked among top 10 service providers
Collabera was ranked:
32 in the Top 100 Large Businesses in the U.S
18 in Top 500 Diversity Owned Businesses in the U.S
3 in the Top 100 Diversity Owned Businesses in New Jersey
3 in the Top 100 Privately-held Businesses in New Jersey
66th on FinTech 100
35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Work Location: Durham NC 27703
Job Title: Network SecurityAnalyst
Duration: 24 Months
Roles & Responsibilities:
• Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis.
• Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired.
• The Operations team supports 24x7 and an off shift work schedule may be required.
Qualifications
IDS/IPS
"Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer"
Additional Information
Should you have any questions, please feel free to call:
************
Aditika Sithta
$75k-101k yearly est. 60d+ ago
Security Engineer - IR Threat Intelligence
Meta 4.8
Cyber security analyst job in Raleigh, NC
Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture.
**Required Skills:**
Security Engineer - IR Threat Intelligence Responsibilities:
1. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network
2. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences
3. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations
4. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems
5. Engage constructively in cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions
**Minimum Qualifications:**
Minimum Qualifications:
6. 5+ years threat intelligence experience
7. Bachelor's degree or equivalent experience in Security
8. Familiarity with campaign tracking techniques and ability to convert the tracking results to long term countermeasures
9. Familiarity with threat modeling framework, such as Diamond Model or/and MITRE ATT&CK framework
10. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks
11. Proven track record of managing and executing on short term and long term projects
12. Ability to work with a team spanning multiple locations/time zones
13. Ability to prioritize and execute tasks with minimal direction or oversight
14. Ability to think critically and qualify assessments with solid communications skills
15. Coding or scripting experience in one or more scripting languages such as Python or PHP
**Preferred Qualifications:**
Preferred Qualifications:
16. Experience close collaborating with incident responders on incident investigations
17. Familiarity with malware analysis or network traffic analysis
18. Familiarity with nation-state, sophisticated criminal, or supply chain threats
19. Production of file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort
20. Experience in one or more query languages such as SQL
21. Experience writing production code for threat intelligence tooling
22. Experience conducting large scale data analysis
23. Experience working across the broader security community
**Public Compensation:**
$154,000/year to $217,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
$154k-217k yearly 7d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Raleigh, NC
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d+ ago
Sr. Security Analyst
Procom Consultants Group 4.2
Cyber security analyst job in Durham, NC
Procom is a leading provider of professional IT services and staffing to businesses and governments in Canada. With revenues over $500 million, the Branham Group has recognized Procom as the 3rd largest professional services firm in Canada and is now the largest “Canadian-Owned” IT staffing/consulting company.
Procom's areas of staffing expertise include:
• Application Development
• Project Management
• Quality Assurance
• Business/Systems Analysis
• Datawarehouse & Business Intelligence
• Infrastructure & Network Services
• Risk Management & Compliance
• Business Continuity & Disaster Recovery
• Security & Privacy
Specialties• Contract Staffing (Staff Augmentation)
• Permanent Placement (Staff Augmentation)
• ICAP (Contractor Payroll)
• Flextrack (Vendor Management System)
Job Description
Sr. SecurityAnalyst
On behalf of our client, Procom Services is searching for a Sr. SecurityAnalyst for a contract opportunity in Durham, NC.
Sr. SecurityAnalyst Job Details
Responsible for user account administration in a multi-platform environment and ensure that administration procedures are aligned with overall Information Security policies and standards. Assist in the development of access controls to safeguard customer systems against accidental or unauthorized modification, destruction or disclosure.
Maintain user access to securable customer system resources (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange) performing tasks such as: creation / configuration of user logon Ids and updating access control lists, access provisioning and access removals and access terminations.
Perform detailed analysis of access requests/processes and provide recommendations for improvement to senior team members and Information Security management.
Educate information / resource owners in the implementation of necessary information security controls.
Perform standard and non-standard processing of security authorization requests.
Work with resource owners to determine appropriate security policies for securable customer resources.
Provide on-call support for after-hours system access issues and troubleshoot system access problems and failures.
Report suspected information security misuse to manager or director.
Assist resource owners and IT staff in understanding and responding to security access exceptions.
Sr. SecurityAnalyst Mandatory Skills
- Bachelor's degree in Computer Science.
- 2 years of security administration experience, or related technical system administration experience.
- In lieu of degree 5 years of security administration experience.
- Familiarity with audit and risk-related methodologies; such as COBIT and HIPAA.
- Systems administration experience within other aspects of IT
- Demonstrated security administration experience on two or more platforms (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange)
- Demonstrated experience working with a managed services organization.
- Demonstrated experience working with a request ticketing system, such as Triole.
- Strong analytical and problem-solving skills.
- Ability to present and discuss technical information to users with varying technical expertise.
- Proven ability to work under stress in emergencies. Flexibility to handle pressure from many directions simultaneously.
- Must be detail-oriented with a high level of accuracy.
- Excellent written and verbal communication skills.
- Demonstrated ability to develop and maintain collaborative working relationships across multiple teams.
- Strong customer focus and the ability to manage customer expectations.
- Must have strong team-oriented interpersonal skills and the ability to effectively interface with a wide variety of people.
- Demonstrated commitment to continuous process improvement.
- CISSP, CISA, or other security / audit / field related certifications a plus
Sr. SecurityAnalyst Start Date
ASAP
Sr. SecurityAnalyst Assignment Length
7+ months
Additional Information
All your information will be kept confidential according to EEO guidelines. Please send your resume in Word format only.
$75k-95k yearly est. 60d+ ago
Lead Information Security Architect / Engineer
Pathwayrp
Cyber security analyst job in Durham, NC
EmTacq specializes in EMployer Talent ACQuisitions, matching the most qualified candidates with the most competitive positions available. We pride ourselves on not just putting bodies in seats, rather matching professionals to their careers. We are headquartered in the Raleigh / Durham, NC area. However, as a recruiting agency we service companies and candidates across the United States. We are your best source for professional, value driven low cost recruitment services.
Job Description
The Lead Information Security Engineer will be responsible for designing and implementing a process to analyze the design of technology solutions for threats, attacks, and vulnerabilities that could affect the control environment. Must be a subject matter expert (SME) with strong collaboration skills to work with cross functional teams to ensure the design of technology solutions complies with information security policies, and regulatory obligations.
The Lead Information Security Engineer must have the ability to identify, document, and recommend security safeguards and configurations in a highly complex environment with a demonstrated ability to recognize, and appropriately incorporate layered security safeguards within the network, application, and data layers from a defender's perspective. In this role you must be a positive professional, adaptable, pragmatic, and who is comfortable in delivering clear and concise information at both a technical and managerial level.
Responsibilities:
Design and implement a process to analyze the design of technology solutions for threats, attacks, and vulnerabilities that could affect the client's control environment. Review and approve security configuration checklists (e.g., hardening or lockdown guides) for technology platforms and solutions (e.g., operating systems, databases, firewalls, etc.) Provide security consulting services internally to the engineering organization by giving guidance and functioning as an information security SME. Must have the ability to identify, document, and recommend security safeguards and configurations in a highly complex environment with a demonstrated ability to recognize, and appropriately incorporate layered security safeguards within the network, application, and data layers from a defender's perspective.
Qualifications
Required Experience
*5+ years of experience in one or more of the following information security domains: access management, cryptography, data loss prevention (DLP), emerging technologies (i.e., cloud, mobile, etc.), endpoint security, incident response, malware analysis and protection, network and perimeter security, or web and mobile application security.
*5+ years of experience analyzing the design of technology solutions using common industry frameworks such as DREAD, SSE-CMM (ISO/IEC 21827), STRIDE, or other risk assessment models.
*5+ years of working knowledge of various industry security standards and frameworks including: ISO 27001, ISF Standard of Good Practice (SoGP), NIST Special Publications, etc.
*5+ years of working knowledge of modern enterprise and security architectures, their challenges, common approaches to overcome their challenges, and their inherent security strengths and weaknesses.
*Teamwork and communication skills, both written and verbal.
Preferred Experience
*Bachelor's degree in Computer Science, Information Systems, or related field. 8+ years of equivalent work experience required in lieu of degree is acceptable.
*Professional certifications such as: CISSP, CISA, CISM, GIAC, CGEIT, CRISC, CEH, or other relevant industry certification strongly preferred.
Additional Information
Equal Employment Opportunity
Our client is proud to be an equal opportunity/affirmative action employer. We are committed to attracting, retaining and maximizing the performance of a diverse and inclusive workforce. It is their policy to ensure equal employment opportunity without discrimination or harassment on the basis of race, color, creed, religion, national origin, alienage or citizenship status, age, sex, sexual orientation, gender identity or expression, marital or domestic/civil partnership status, disability, veteran status, genetic information or any other basis protected by law.
Junior SecurityAnalyst The Company: Varonis (Nasdaq: VRNS) is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
Thousands of organizations worldwide trust Varonis to defend their data wherever it lives - across SaaS, IaaS, and hybrid cloud environments. Customers use Varonis to automate a wide range of security outcomes, including data security posture management (DSPM), data classification, data access governance (DAG), data detection and response (DDR), data loss prevention (DLP), and insider risk management.
Varonis protects data first, not last. Learn more at ****************
The Role: We are seeking a driven MDDR SecurityAnalyst to join the forefront of our data security mission- working 24x7 to monitor, triage, investigate, and escalate incidents where data is at risk and to ensure we meet operational SLAs. Data is the #1 target of attackers, and Varonis' Managed Data Detection and Response (MDDR) customers entrust our team with the security of their data. They will develop a deep understanding of the Varonis platform and related technologies. This role demands knowledge of security ecosystems (ex. SIEM, SOAR, ITSM, EDR, IPS/IDS, Active Directory, DNS, IAM/PAM, etc.) and enterprise security operations.
The Requirements:
* 1-3 years of experience in cybersecurity
* Degree or certification(s) in cybersecurity and/or proven ability to execute across cybersecurity operations disciplines, including monitoring, detection, investigation, and incident response.
* Proven success in contributing to a team-oriented environment.
* Strong analytical and creative problem-solving skills.
* Excellent communication skills (written and oral) and interpersonal skills (colleagues and customers).
* Attention to detail and the capability to deliver outcomes autonomously.
* Knowledge of common security technologies and tools including network-based (firewall and IDS), host-based (EDR and AV), data-based (DLP and DSPM), and identity-based (PAM and IAM), gained through experience or study.
* Knowledge of operational information security disciplines including alert monitoring, threat detection, incident response, security infrastructure management, and system and architecture hardening, gained through experience or study.
* Demonstrated ability to learn new skills and technologies swiftly.
* Proficiency in critical thinking and problem-solving for complex issues.
The Responsibilities:
* Monitor and respond to detections within the Varonis platform.
* Conduct thorough triage of Varonis detections through critical analysis and investigative methodologies.
* Validate findings and coordinate investigative and response efforts with customers and internal teams.
* Document and communicate investigative findings effectively, including tracking in CRM and related systems.
* Assist in the development, documentation, analysis, testing, and modification of Varonis' threat detection systems, playbooks, and runbooks.
Logistics:
* Shifted Schedule:
* Wednesday to Saturday (11:00AM - 9:00PM EST)
* 8 weeks of dedicated new hire training.
* MDDR SecurityAnalysts are expected to complete Sec+ and CySA+ training within their first year.
* Work visa sponsorship is not available.
We invite you to check out our Instagram Page to gain further insight into the Varonis culture!
@VaronisLife
Varonis is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, national origin, disability, veteran status, and other legally protected characteristics
Please review our Notice of E-Verify Participation and our Right to Work Statements.
How much does a cyber security analyst earn in Wake Forest, NC?
The average cyber security analyst in Wake Forest, NC earns between $64,000 and $115,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Wake Forest, NC